Lucene search

K
nessusTenable5683.PRM
HistoryOct 20, 2010 - 12:00 a.m.

Mozilla Thunderbird 3.0.x < 3.0.9 Multiple Vulnerabilities

2010-10-2000:00:00
Tenable
www.tenable.com
12

Versions of Mozilla Thunderbird 3.0.x prior to 3.0.9 are affected by the following vulnerabilities :

  • Multiple memory safety bugs could lead to memory corruption, potentially resulting in arbitrary code execution. (MFSA 2010-64)
  • By passing an excessively long string to ‘document.write’ it may be possible to trigger a buffer overflow condition resulting in arbitrary code execution on the remote system. (MFSA 2010-65)
  • A use-after-free error in ‘nsBarProp’ could allow arbitrary code execution on the remote system. (MFSA 2010-66)
  • A dangling pointer vulnerability in ‘LookupGetterOrSetter’ could allow arbitrary code execution. (MFSA 2010-67)
  • It is possible to steal information from a site in a different domain using modal calls. (MFSA 2010-69)
  • It is possible to establish a valid SSL connection to a remote host, provided the SSL certificate was created with a common name containing a wild card followed by the partial IP address of the remote host. (MFSA 2010-70)
  • A function used to load external libraries on the Windows platform could allow loading of unsafe DLL’s thus allowing binary planting attack. (MFSA 2010-71)
  • The SSL implementation allows servers to use Diffie-Hellman mode (DHE) with a very short key length. Such key lengths could be easily breakable with modern hardware. (MFSA 2010-72)
Binary data 5683.prm
VendorProductVersionCPE
mozillathunderbirdcpe:/a:mozilla:thunderbird

References