Mozilla Thunderbird 10.x < 10.0.2 'png_decompress_chunk' Integer Overflow

high Nessus Network Monitor Plugin ID 6327

Synopsis

The remote host has a mail client installed that is affected by an integer overflow vulnerability.

Description

Versions of Mozilla Thunderbird 10.x prior to 10.0.2 are affected by an integer overflow error in 'libpng', a library used by this application. When decompressing certain PNG image files, this error can allow a heap-based buffer overflow which can crash the application or potentially allow code execution.

Solution

Upgrade to Thunderbird 10.0.2 or later.

See Also

http://www.mozilla.org/security/announce/2012/mfsa2012-11.html

http://www.mozilla.org/security/known-vulnerabilities/thunderbird.html#thunderbird10.0.2

Plugin Details

Severity: High

ID: 6327

Family: SMTP Clients

Published: 2/20/2012

Updated: 3/6/2019

Nessus ID: 58007, 58075

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 6.9

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

CVSS v3

Risk Factor: High

Base Score: 7.4

Temporal Score: 6.4

Vector: CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:X

Vulnerability Information

CPE: cpe:/a:mozilla:thunderbird

Patch Publication Date: 2/16/2012

Vulnerability Publication Date: 2/16/2012

Reference Information

CVE: CVE-2011-3026

BID: 52049