Lucene search

K
nessusTenable4696.PRM
HistorySep 26, 2008 - 12:00 a.m.

Mozilla Thunderbird < 2.0.0.17 Multiple Vulnerabilities

2008-09-2600:00:00
Tenable
www.tenable.com
8

Versions of Mozilla Thunderbird prior to 2.0.0.17 are affected by the following vulnerabilities :

  • Using a specially crafted UTF-8 URL in a hyperlink, an attacker might be able to exploit a stack buffer overflow in the Mozilla URL parsing routes to execute arbitrary code (MFSA 2008-37).
  • It is possible to bypass the same-origin check in ‘nsXMLDocument::OnChannelRedirect()’ (MFSA 2008-38).
  • Privilege escalation is possible via ‘XPCnativeWrapper’ pollution (MFSA 2008-41).
  • There are several stability bugs in the browser engine that may lead to crashes with evidence of memory corruption (MFSA 2008-42).
  • Certain BOM characters and low surrogate characters, if HTML-escaped, are stripped from JavaScript code before it is executed, which could allow for cross-site scripting attacks (MFSA 2008-43).
  • The ‘resource:’ protocol allows directory traversal on Linux when using URL-encoded slashes, and it can by used to bypass restrictions on local HTML files (MFSA 2008-44).
  • There is a heap buffer overflow that can be triggered when canceling a newsgroup message (MFSA 2008-46).
Binary data 4696.prm
VendorProductVersionCPE
mozillathunderbirdcpe:/a:mozilla:thunderbird

References