CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
EPSS
Percentile
96.4%
The version of Thunderbird installed on the remote host is a version prior to 31.2. It is, therefore, affected by the following vulnerabilities :
Multiple memory safety flaws exist within the browser engine. Exploiting these, an attacker can cause a denial of service or execute arbitrary code. (CVE-2014-1574, CVE-2014-1575)
A buffer overflow vulnerability exists when capitalization style changes occur during CSS parsing.
(CVE-2014-1576)
An out-of-bounds read error exists in the Web Audio component when invalid values are used in custom waveforms that leads to a denial of service or information disclosure. (CVE-2014-1577)
An out-of-bounds write error exists when processing invalid tile sizes in ‘WebM’ format videos that result in arbitrary code execution. (CVE-2014-1578)
A use-after-free error exists in the ‘DirectionalityUtils’ component when text direction is used in the text layout that results in arbitrary code execution. (CVE-2014-1581)
Multiple issues exist in WebRTC when the session is running within an ‘iframe’ element that will allow the session to be accessible even when sharing is stopped and when returning to the website. This could lead to video inadvertently being shared. (CVE-2014-1585, CVE-2014-1586)
#
# (C) Tenable Network Security, Inc.
#
include("compat.inc");
if (description)
{
script_id(78471);
script_version("1.7");
script_cvs_date("Date: 2019/11/25");
script_cve_id(
"CVE-2014-1574",
"CVE-2014-1575",
"CVE-2014-1576",
"CVE-2014-1577",
"CVE-2014-1578",
"CVE-2014-1581",
"CVE-2014-1585",
"CVE-2014-1586"
);
script_bugtraq_id(
70425,
70426,
70427,
70428,
70430,
70436,
70439,
70440
);
script_name(english:"Mozilla Thunderbird < 31.2 Multiple Vulnerabilities (Mac OS X)");
script_summary(english:"Checks the version of Thunderbird.");
script_set_attribute(attribute:"synopsis", value:
"The remote Mac OS X host contains a mail client that is affected by
multiple vulnerabilities.");
script_set_attribute(attribute:"description", value:
"The version of Thunderbird installed on the remote host is a version
prior to 31.2. It is, therefore, affected by the following
vulnerabilities :
- Multiple memory safety flaws exist within the browser
engine. Exploiting these, an attacker can cause a denial
of service or execute arbitrary code. (CVE-2014-1574,
CVE-2014-1575)
- A buffer overflow vulnerability exists when
capitalization style changes occur during CSS parsing.
(CVE-2014-1576)
- An out-of-bounds read error exists in the Web Audio
component when invalid values are used in custom
waveforms that leads to a denial of service or
information disclosure. (CVE-2014-1577)
- An out-of-bounds write error exists when processing
invalid tile sizes in 'WebM' format videos that result
in arbitrary code execution. (CVE-2014-1578)
- A use-after-free error exists in the
'DirectionalityUtils' component when text direction is
used in the text layout that results in arbitrary
code execution. (CVE-2014-1581)
- Multiple issues exist in WebRTC when the session is
running within an 'iframe' element that will allow the
session to be accessible even when sharing is stopped
and when returning to the website. This could lead to
video inadvertently being shared. (CVE-2014-1585,
CVE-2014-1586)");
script_set_attribute(attribute:"see_also", value:"https://www.mozilla.org/security/announce/2014/mfsa2014-74.html");
script_set_attribute(attribute:"see_also", value:"https://www.mozilla.org/security/announce/2014/mfsa2014-75.html");
script_set_attribute(attribute:"see_also", value:"https://www.mozilla.org/security/announce/2014/mfsa2014-76.html");
script_set_attribute(attribute:"see_also", value:"https://www.mozilla.org/security/announce/2014/mfsa2014-77.html");
script_set_attribute(attribute:"see_also", value:"https://www.mozilla.org/security/announce/2014/mfsa2014-79.html");
script_set_attribute(attribute:"see_also", value:"https://www.mozilla.org/security/announce/2014/mfsa2014-81.html");
script_set_attribute(attribute:"solution", value:
"Upgrade to Thunderbird 31.2 or later.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2014-1581");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_set_attribute(attribute:"exploit_available", value:"false");
script_set_attribute(attribute:"vuln_publication_date", value:"2014/10/14");
script_set_attribute(attribute:"patch_publication_date", value:"2014/10/14");
script_set_attribute(attribute:"plugin_publication_date", value:"2014/10/15");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"cpe:/a:mozilla:thunderbird");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"MacOS X Local Security Checks");
script_copyright(english:"This script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("macosx_thunderbird_installed.nasl");
script_require_keys("MacOSX/Thunderbird/Installed");
exit(0);
}
include("mozilla_version.inc");
kb_base = "MacOSX/Thunderbird";
get_kb_item_or_exit(kb_base+"/Installed");
version = get_kb_item_or_exit(kb_base+"/Version", exit_code:1);
path = get_kb_item_or_exit(kb_base+"/Path", exit_code:1);
if (get_kb_item(kb_base + '/is_esr')) exit(0, 'The Mozilla Thunderbird install is in the ESR branch.');
mozilla_check_version(product:'thunderbird', version:version, path:path, esr:FALSE, fix:'31.2', min:'31.0', severity:SECURITY_HOLE, xss:FALSE);
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1574
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1575
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1576
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1577
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1578
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1581
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1585
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1586
www.mozilla.org/security/announce/2014/mfsa2014-74.html
www.mozilla.org/security/announce/2014/mfsa2014-75.html
www.mozilla.org/security/announce/2014/mfsa2014-76.html
www.mozilla.org/security/announce/2014/mfsa2014-77.html
www.mozilla.org/security/announce/2014/mfsa2014-79.html
www.mozilla.org/security/announce/2014/mfsa2014-81.html