The installed version of Thunderbird is earlier than 17.0.5 and is, therefore, potentially affected by the following vulnerabilities :
Various memory safety issues exist. (CVE-2013-0788, CVE-2013-0789)
An out-of-bounds memory read error exists related to ‘CERT_DecodeCertPackage’ and certificate decoding.
(CVE-2013-0791)
A memory corruption error exists related to PNG image files when ‘gfx.color_management.enablev4’ is manually enabled in the application’s configuration.
(CVE-2013-0792)
An error exists related to navigation, history and improper ‘baseURI’ property values that could allow cross-site scripting attacks. (CVE-2013-0793)
An error exists related to tab-modal dialog boxes that could be used in phishing attacks. (CVE-2013-0794)
An error exists related to ‘cloneNode’ that can allow ‘System Only Wrapper’ (SOW) to be bypassed, thus violating the same origin policy and possibly leading to privilege escalation and code execution.
(CVE-2013-0795)
An out-of-bounds write error exists related to the Cairo graphics library. (CVE-2013-0800)
#
# (C) Tenable Network Security, Inc.
#
include("compat.inc");
if (description)
{
script_id(65803);
script_version("1.8");
script_cvs_date("Date: 2019/11/27");
script_cve_id(
"CVE-2013-0788",
"CVE-2013-0789",
"CVE-2013-0791",
"CVE-2013-0792",
"CVE-2013-0793",
"CVE-2013-0794",
"CVE-2013-0795",
"CVE-2013-0800"
);
script_bugtraq_id(
58819,
58821,
58825,
58826,
58828,
58835,
58836,
58837
);
script_name(english:"Thunderbird < 17.0.5 Multiple Vulnerabilities (Mac OS X)");
script_summary(english:"Checks version of Thunderbird");
script_set_attribute(attribute:"synopsis", value:
"The remote Mac OS X host contains a mail client that is potentially
affected by multiple vulnerabilities.");
script_set_attribute(attribute:"description", value:
"The installed version of Thunderbird is earlier than 17.0.5 and is,
therefore, potentially affected by the following vulnerabilities :
- Various memory safety issues exist. (CVE-2013-0788,
CVE-2013-0789)
- An out-of-bounds memory read error exists related to
'CERT_DecodeCertPackage' and certificate decoding.
(CVE-2013-0791)
- A memory corruption error exists related to PNG image
files when 'gfx.color_management.enablev4' is manually
enabled in the application's configuration.
(CVE-2013-0792)
- An error exists related to navigation, history and
improper 'baseURI' property values that could allow
cross-site scripting attacks. (CVE-2013-0793)
- An error exists related to tab-modal dialog boxes that
could be used in phishing attacks. (CVE-2013-0794)
- An error exists related to 'cloneNode' that can allow
'System Only Wrapper' (SOW) to be bypassed, thus
violating the same origin policy and possibly leading
to privilege escalation and code execution.
(CVE-2013-0795)
- An out-of-bounds write error exists related to the
Cairo graphics library. (CVE-2013-0800)");
script_set_attribute(attribute:"see_also", value:"https://www.mozilla.org/en-US/security/advisories/mfsa2013-30/");
script_set_attribute(attribute:"see_also", value:"https://www.mozilla.org/en-US/security/advisories/mfsa2013-31/");
script_set_attribute(attribute:"see_also", value:"https://www.mozilla.org/en-US/security/advisories/mfsa2013-36/");
script_set_attribute(attribute:"see_also", value:"https://www.mozilla.org/en-US/security/advisories/mfsa2013-37/");
script_set_attribute(attribute:"see_also", value:"https://www.mozilla.org/en-US/security/advisories/mfsa2013-38/");
script_set_attribute(attribute:"see_also", value:"https://www.mozilla.org/en-US/security/advisories/mfsa2013-39/");
script_set_attribute(attribute:"see_also", value:"https://www.mozilla.org/en-US/security/advisories/mfsa2013-40/");
script_set_attribute(attribute:"solution", value:
"Upgrade to Thunderbird 17.0.5 or later.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2013-0795");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_set_attribute(attribute:"exploit_available", value:"false");
script_set_attribute(attribute:"vuln_publication_date", value:"2013/04/02");
script_set_attribute(attribute:"patch_publication_date", value:"2013/04/02");
script_set_attribute(attribute:"plugin_publication_date", value:"2013/04/04");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"cpe:/a:mozilla:thunderbird");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"MacOS X Local Security Checks");
script_copyright(english:"This script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("macosx_thunderbird_installed.nasl");
script_require_keys("MacOSX/Thunderbird/Installed");
exit(0);
}
include("mozilla_version.inc");
kb_base = "MacOSX/Thunderbird";
get_kb_item_or_exit(kb_base+"/Installed");
version = get_kb_item_or_exit(kb_base+"/Version", exit_code:1);
path = get_kb_item_or_exit(kb_base+"/Path", exit_code:1);
if (get_kb_item(kb_base + '/is_esr')) exit(0, 'The Mozilla Thunderbird install is in the ESR branch.');
mozilla_check_version(product:'thunderbird', version:version, path:path, esr:FALSE, fix:'17.0.5', severity:SECURITY_HOLE);
Vendor | Product | Version | CPE |
---|---|---|---|
mozilla | thunderbird | cpe:/a:mozilla:thunderbird |
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0788
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0789
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0791
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0792
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0793
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0794
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0795
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0800
www.mozilla.org/en-US/security/advisories/mfsa2013-30/
www.mozilla.org/en-US/security/advisories/mfsa2013-31/
www.mozilla.org/en-US/security/advisories/mfsa2013-36/
www.mozilla.org/en-US/security/advisories/mfsa2013-37/
www.mozilla.org/en-US/security/advisories/mfsa2013-38/
www.mozilla.org/en-US/security/advisories/mfsa2013-39/
www.mozilla.org/en-US/security/advisories/mfsa2013-40/