Mozilla Thunderbird 3.0.x < 3.0.7 Multiple Vulnerabilities

medium Nessus Network Monitor Plugin ID 5658

Synopsis

The remote host has an email client installed that is vulnerable to multiple attack vectors.

Description

Versions of Mozilla Thunderbird 3.0.x prior to 3.0.7 are affected by the following vulnerabilities :

- Multiple memory safety issues that could lead to arbitrary code execution. (MFSA 2010-49)
- The implementation of the HTML frameset element contains an integer overflow vulnerability. (MFSA 2010-50)
- A dangling pointer vulnerability exists in the implementation of 'navigator.plugins' in which the 'navigator' object could retain a pointer to the plugins array even after it has been destroyed. (MFSA 2010-51)
- Thunderbird can be used to load a malicious code library that has been planted on a victim's computer. (MFSA 2010-52)
- A heap buffer overflow exists in code routines responsible for transforming text runs. (MFSA 2010-53)
- A dangling pointer issue remains leftover from the fix for CVE-2010-2753. (MFSA 2010-54)
- XUL '<tree>' objects can be manipulated such that the setting of certain properties on the object would trigger the removal of the tree from the DOM and cause certain sections of deleted memory to be accessed. (MFSA 2010-55)
- The implementation of the XUL '<tree>' content view contains a dangling pointer vulnerability. (MFSA 2010-56)
- The code used to normalize a document contains a logical flaw that could be leveraged to run arbitrary code. (MFSA 2010-57)
- A specially crafted font can be applied to a document and cause a crash on Mac systems. (MFSA 2010-58)
- The wrapper class 'XPCSafeJSObjectWrapper (SJOW) has a logical error in its scripted function implementation that allows the caller to run the function within the context of another site. (MFSA 2010-60)
- The 'type' attribute of an <object> tag can override the charset of a framed HTML document even when the document is included across origins. (MFSA 2010-61)
- When an HTML selection containing JavaScript is copy-and-pasted or dropped onto a document with designMode enabled, the JavaScript will be executed within the context of the site where the code was dropped. (MFSA 2010-62)
- The 'statusText' property of an 'XMLHttpRequest' object is readable by the requestor even when the request is made across origins. (MFSA 2010-63)

Solution

Upgrade to Thunderbird 3.0.7 or later.

See Also

http://www.mozilla.org/security/known-vulnerabilities/thunderbird30.html#thunderbird3.0.7

http://www.mozilla.org/security/announce/2010/mfsa2010-49.html

http://www.mozilla.org/security/announce/2010/mfsa2010-50.html

http://www.mozilla.org/security/announce/2010/mfsa2010-51.html

http://www.mozilla.org/security/announce/2010/mfsa2010-52.html

http://www.mozilla.org/security/announce/2010/mfsa2010-53.html

http://www.mozilla.org/security/announce/2010/mfsa2010-54.html

http://www.mozilla.org/security/announce/2010/mfsa2010-55.html

http://www.mozilla.org/security/announce/2010/mfsa2010-56.html

http://www.mozilla.org/security/announce/2010/mfsa2010-57.html

http://www.mozilla.org/security/announce/2010/mfsa2010-58.html

http://www.mozilla.org/security/announce/2010/mfsa2010-60.html

http://www.mozilla.org/security/announce/2010/mfsa2010-61.html

http://www.mozilla.org/security/announce/2010/mfsa2010-62.html

http://www.mozilla.org/security/announce/2010/mfsa2010-63.html

Plugin Details

Severity: Medium

ID: 5658

Family: SMTP Clients

Published: 9/8/2010

Updated: 3/6/2019

Nessus ID: 49147

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 6.1

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

CVSS v3

Risk Factor: Medium

Base Score: 4.9

Temporal Score: 4.7

Vector: CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L

Temporal Vector: CVSS:3.0/E:F/RL:W/RC:X

Vulnerability Information

CPE: cpe:/a:mozilla:thunderbird

Patch Publication Date: 9/7/2010

Vulnerability Publication Date: 8/26/2010

Reference Information

CVE: CVE-2010-2760, CVE-2010-2763, CVE-2010-2764, CVE-2010-2765, CVE-2010-2766, CVE-2010-2767, CVE-2010-2768, CVE-2010-2769, CVE-2010-2770, CVE-2010-3131, CVE-2010-3166, CVE-2010-3167, CVE-2010-3168, CVE-2010-3169

BID: 43091, 43093, 43094, 43097, 43101, 43102, 43106, 43108, 43118, 42744, 43096