Mozilla Thunderbird 3.1 < 3.1.5 Multiple Vulnerabilities - Memory corruption, buffer overflow, code execution, SSL security issues
Reporter | Title | Published | Views | Family All 199 |
---|---|---|---|---|
OpenVAS | Mozilla Products Multiple Vulnerabilities October-10 (Windows) | 28 Oct 201000:00 | – | openvas |
OpenVAS | Mozilla Products Multiple Vulnerabilities (Oct 2010) - Windows | 28 Oct 201000:00 | – | openvas |
OpenVAS | RedHat Update for firefox RHSA-2010:0782-01 | 22 Oct 201000:00 | – | openvas |
OpenVAS | CentOS Update for firefox CESA-2010:0782 centos4 i386 | 4 Nov 201000:00 | – | openvas |
OpenVAS | CentOS Update for firefox CESA-2010:0782 centos4 i386 | 4 Nov 201000:00 | – | openvas |
OpenVAS | Oracle: Security Advisory (ELSA-2010-0782) | 6 Oct 201500:00 | – | openvas |
OpenVAS | Mandriva Update for mozilla-thunderbird MDVSA-2010:211 (mozilla-thunderbird) | 26 Oct 201000:00 | – | openvas |
OpenVAS | CentOS Update for firefox CESA-2010:0782 centos5 i386 | 9 Aug 201100:00 | – | openvas |
OpenVAS | CentOS Update for firefox CESA-2010:0782 centos5 i386 | 9 Aug 201100:00 | – | openvas |
OpenVAS | Mandriva Update for firefox MDVSA-2010:210 (firefox) | 26 Oct 201000:00 | – | openvas |
#
# (C) Tenable Network Security, Inc.
#
include("compat.inc");
if (description)
{
script_id(50087);
script_version("1.16");
script_cvs_date("Date: 2018/11/15 20:50:27");
script_cve_id("CVE-2010-3170", "CVE-2010-3173", "CVE-2010-3175", "CVE-2010-3176", "CVE-2010-3178",
"CVE-2010-3179", "CVE-2010-3180", "CVE-2010-3181", "CVE-2010-3183");
script_bugtraq_id(42817, 44243, 44245, 44247, 44248, 44249, 44250, 44252);
script_xref(name:"Secunia", value:"41890");
script_name(english:"Mozilla Thunderbird 3.1 < 3.1.5 Multiple Vulnerabilities");
script_summary(english:"Checks version of Thunderbird");
script_set_attribute(attribute:"synopsis", value:
"The remote Windows host contains a mail client that is affected by
multiple vulnerabilities."
);
script_set_attribute(attribute:"description", value:
"The installed version of Thunderbird 3.1 is earlier than 3.1.5. Such
versions are potentially affected by the following security issues :
- Multiple memory safety bugs could lead to memory
corruption, potentially resulting in arbitrary
code execution. (MFSA 2010-64)
- By passing an excessively long string to
'document.write', it may be possible to trigger a buffer
overflow condition resulting in arbitrary code execution
on the remote system. (MFSA 2010-65)
- A use-after-free error in nsBarProp could allow
arbitrary code execution on the remote system.
(MFSA 2010-66)
- A dangling pointer vulnerability in LookupGetterOrSetter
could allow arbitrary code execution. (MFSA 2010-67)
- It is possible to steal information from a site in a
different domain using modal calls. (MFSA 2010-69)
- It is possible to establish a valid SSL connection
to a remote host, provided the SSL certificate was
created with a common name containing a wild card
followed by partial IP address of the remote host.
(MFSA 2010-70)
- A function used to load external libraries on Windows
platform could allow loading of unsafe DLLs thus
allowing binary planting attacks. (MFSA 2010-71)
- The SSL implementation allows servers to use
Diffie-Hellman Ephemeral mode (DHE) with a very
short key length. Such key lengths could be easily
breakable with modern hardware. (MFSA 2010-72)");
script_set_attribute(attribute:"see_also", value:"https://www.westpoint.ltd.uk/advisories/wp-10-0001.txt");
script_set_attribute(attribute:"see_also", value:"https://www.zerodayinitiative.com/advisories/ZDI-10-219/");
script_set_attribute(attribute:"see_also", value:"https://www.mozilla.org/en-US/security/advisories/mfsa2010-64/");
script_set_attribute(attribute:"see_also", value:"https://www.mozilla.org/en-US/security/advisories/mfsa2010-65/");
script_set_attribute(attribute:"see_also", value:"https://www.mozilla.org/en-US/security/advisories/mfsa2010-66/");
script_set_attribute(attribute:"see_also", value:"https://www.mozilla.org/en-US/security/advisories/mfsa2010-67/");
script_set_attribute(attribute:"see_also", value:"https://www.mozilla.org/en-US/security/advisories/mfsa2010-69/");
script_set_attribute(attribute:"see_also", value:"https://www.mozilla.org/en-US/security/advisories/mfsa2010-70/");
script_set_attribute(attribute:"see_also", value:"https://www.mozilla.org/en-US/security/advisories/mfsa2010-71/");
script_set_attribute(attribute:"see_also", value:"https://www.mozilla.org/en-US/security/advisories/mfsa2010-72/");
# https://www.mozilla.org/en-US/security/known-vulnerabilities/thunderbird-3.1/
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?587534ee");
script_set_attribute(attribute:"solution", value:"Upgrade to Thunderbird 3.1.5 or later.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C");
script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
script_set_attribute(attribute:"exploit_available", value:"true");
script_set_attribute(attribute:"vuln_publication_date", value:"2010/08/14"); # MFSA 2010-70
script_set_attribute(attribute:"patch_publication_date", value:"2010/10/19");
script_set_attribute(attribute:"plugin_publication_date", value:"2010/10/21");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"cpe:/a:mozilla:thunderbird");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"Windows");
script_copyright(english:"This script is Copyright (C) 2010-2018 Tenable Network Security, Inc.");
script_dependencies("mozilla_org_installed.nasl");
script_require_keys("Mozilla/Thunderbird/Version");
exit(0);
}
include("mozilla_version.inc");
port = get_kb_item_or_exit("SMB/transport");
installs = get_kb_list("SMB/Mozilla/Thunderbird/*");
if (isnull(installs)) audit(AUDIT_NOT_INST, "Thunderbird");
mozilla_check_version(installs:installs, product:'thunderbird', esr:FALSE, fix:'3.1.5', min:'3.1.0', severity:SECURITY_HOLE);
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo