Lucene search

K
nessusThis script is Copyright (C) 2024 and is owned by Tenable, Inc. or an Affiliate thereof.MOZILLA_THUNDERBIRD_115_14.NASL
HistoryAug 06, 2024 - 12:00 a.m.

Mozilla Thunderbird < 115.14

2024-08-0600:00:00
This script is Copyright (C) 2024 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
14
mozilla thunderbird
version 115.14
remote windows host
multiple vulnerabilities
memory corruption
sandbox escape
use-after-free
out-of-bounds read
web extension
sensitive data
security prompts.

CVSS3

9.6

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H

AI Score

8.6

Confidence

High

EPSS

0.001

Percentile

36.5%

The version of Thunderbird installed on the remote Windows host is prior to 115.14. It is, therefore, affected by multiple vulnerabilities as referenced in the mfsa2024-38 advisory.

  • Insufficient checks when processing graphics shared memory could have led to memory corruption. This could be leveraged by an attacker to perform a sandbox escape. (CVE-2024-7519)

  • Incomplete WebAssembly exception handing could have led to a use-after-free. (CVE-2024-7521)

  • Editor code failed to check an attribute value. This could have led to an out-of-bounds read.
    (CVE-2024-7522)

  • It was possible for a web extension with minimal permissions to create a <code>StreamFilter</code> which could be used to read and modify the response body of requests on any site. (CVE-2024-7525)

  • ANGLE failed to initialize parameters which led to reading from uninitialized memory. This could be leveraged to leak sensitive data from memory. (CVE-2024-7526)

  • Unexpected marking work at the start of sweeping could have led to a use-after-free. (CVE-2024-7527)

  • The date picker could partially obscure security prompts. This could be used by a malicious site to trick a user into granting permissions. (CVE-2024-7529)

Note that Nessus has not tested for these issues but has instead relied only on the application’s self-reported version number.

#%NASL_MIN_LEVEL 80900
## 
# (C) Tenable, Inc.
#                                  
# The descriptive text and package checks in this plugin were
# extracted from Mozilla Foundation Security Advisory mfsa2024-38.
# The text itself is copyright (C) Mozilla Foundation.
##

include('compat.inc');

if (description)
{
  script_id(205038);
  script_version("1.2");
  script_set_attribute(attribute:"plugin_modification_date", value:"2024/08/13");

  script_cve_id(
    "CVE-2024-7519",
    "CVE-2024-7521",
    "CVE-2024-7522",
    "CVE-2024-7525",
    "CVE-2024-7526",
    "CVE-2024-7527",
    "CVE-2024-7529"
  );

  script_name(english:"Mozilla Thunderbird < 115.14");

  script_set_attribute(attribute:"synopsis", value:
"A mail client installed on the remote Windows host is affected by multiple vulnerabilities.");
  script_set_attribute(attribute:"description", value:
"The version of Thunderbird installed on the remote Windows host is prior to 115.14. It is, therefore, affected by
multiple vulnerabilities as referenced in the mfsa2024-38 advisory.

  - Insufficient checks when processing graphics shared memory could have led to memory corruption. This could
    be leveraged by an attacker to perform a sandbox escape. (CVE-2024-7519)

  - Incomplete WebAssembly exception handing could have led to a use-after-free. (CVE-2024-7521)

  - Editor code failed to check an attribute value. This could have led to an out-of-bounds read.
    (CVE-2024-7522)

  - It was possible for a web extension with minimal permissions to create a <code>StreamFilter</code> which
    could be used to read and modify the response body of requests on any site. (CVE-2024-7525)

  - ANGLE failed to initialize parameters which led to reading from uninitialized memory. This could be
    leveraged to leak sensitive data from memory. (CVE-2024-7526)

  - Unexpected marking work at the start of sweeping could have led to a use-after-free. (CVE-2024-7527)

  - The date picker could partially obscure security prompts. This could be used by a malicious site to trick
    a user into granting permissions. (CVE-2024-7529)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version
number.");
  script_set_attribute(attribute:"see_also", value:"https://www.mozilla.org/en-US/security/advisories/mfsa2024-38/");
  script_set_attribute(attribute:"solution", value:
"Upgrade to Mozilla Thunderbird version 115.14 or later.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H");
  script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
  script_set_attribute(attribute:"cvss_score_source", value:"CVE-2024-7527");
  script_set_attribute(attribute:"cvss3_score_source", value:"CVE-2024-7519");

  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"false");

  script_set_attribute(attribute:"vuln_publication_date", value:"2024/08/06");
  script_set_attribute(attribute:"patch_publication_date", value:"2024/08/06");
  script_set_attribute(attribute:"plugin_publication_date", value:"2024/08/06");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:mozilla:thunderbird");
  script_set_attribute(attribute:"generated_plugin", value:"current");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Windows");

  script_copyright(english:"This script is Copyright (C) 2024 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("mozilla_org_installed.nasl");
  script_require_keys("Mozilla/Thunderbird/Version");

  exit(0);
}

include('mozilla_version.inc');

var port = get_kb_item('SMB/transport');
if (!port) port = 445;

var installs = get_kb_list('SMB/Mozilla/Thunderbird/*');
if (isnull(installs)) audit(AUDIT_NOT_INST, 'Thunderbird');

mozilla_check_version(installs:installs, product:'thunderbird', esr:FALSE, fix:'115.14', severity:SECURITY_HOLE);

CVSS3

9.6

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H

AI Score

8.6

Confidence

High

EPSS

0.001

Percentile

36.5%