Lucene search

K
openvasCopyright (C) 2012 Greenbone AGOPENVAS:1361412562310803640
HistoryOct 15, 2012 - 12:00 a.m.

Mozilla Thunderbird ESR Multiple Vulnerabilities - 01 - Windows

2012-10-1500:00:00
Copyright (C) 2012 Greenbone AG
plugins.openvas.org
23

9.6 High

AI Score

Confidence

High

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.713 High

EPSS

Percentile

98.0%

Mozilla Thunderbird ESR is prone to multiple vulnerabilities.

# SPDX-FileCopyrightText: 2012 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

if(description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.803640");
  script_version("2024-02-28T05:05:37+0000");
  script_cve_id("CVE-2012-4188", "CVE-2012-4187", "CVE-2012-4186", "CVE-2012-4185",
                "CVE-2012-4184", "CVE-2012-3982", "CVE-2012-3990", "CVE-2012-3988",
                "CVE-2012-3986", "CVE-2012-3991", "CVE-2012-3992", "CVE-2012-4183",
                "CVE-2012-4182", "CVE-2012-4181", "CVE-2012-4180", "CVE-2012-4179",
                "CVE-2012-3995", "CVE-2012-3994", "CVE-2012-3993", "CVE-2012-3983");
  script_tag(name:"cvss_base", value:"10.0");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:C/I:C/A:C");
  script_tag(name:"last_modification", value:"2024-02-28 05:05:37 +0000 (Wed, 28 Feb 2024)");
  script_tag(name:"creation_date", value:"2012-10-15 17:43:07 +0530 (Mon, 15 Oct 2012)");
  script_name("Mozilla Thunderbird ESR Multiple Vulnerabilities - 01 - Windows");
  script_xref(name:"URL", value:"http://secunia.com/advisories/50856");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/55856");
  script_xref(name:"URL", value:"http://secunia.com/advisories/50935");
  script_xref(name:"URL", value:"http://www.mozilla.org/security/announce/2012/mfsa2012-86.html");
  script_xref(name:"URL", value:"http://www.mozilla.org/security/announce/2012/mfsa2012-83.html");
  script_xref(name:"URL", value:"http://www.mozilla.org/security/announce/2012/mfsa2012-74.html");
  script_xref(name:"URL", value:"http://www.mozilla.org/security/announce/2012/mfsa2012-87.html");
  script_xref(name:"URL", value:"http://www.mozilla.org/security/announce/2012/mfsa2012-79.html");
  script_xref(name:"URL", value:"http://www.mozilla.org/security/announce/2012/mfsa2012-77.html");
  script_xref(name:"URL", value:"http://www.mozilla.org/security/announce/2012/mfsa2012-81.html");
  script_xref(name:"URL", value:"http://www.mozilla.org/security/announce/2012/mfsa2012-84.html");
  script_xref(name:"URL", value:"http://www.mozilla.org/security/announce/2012/mfsa2012-85.html");
  script_xref(name:"URL", value:"http://www.mozilla.org/security/announce/2012/mfsa2012-82.html");
  script_xref(name:"URL", value:"http://www.mozilla.org/security/announce/2012/mfsa2012-74.html");
  script_xref(name:"URL", value:"http://www.mozilla.org/security/announce/2012/mfsa2012-83.html");
  script_category(ACT_GATHER_INFO);
  script_copyright("Copyright (C) 2012 Greenbone AG");
  script_family("General");
  script_dependencies("gb_thunderbird_detect_portable_win.nasl");
  script_mandatory_keys("Thunderbird-ESR/Win/Ver");
  script_tag(name:"impact", value:"Successful exploitation will let attackers to conduct cross site scripting
  attacks, cause a denial of service memory corruption and application crash
  or possibly execute arbitrary code via unspecified vectors.");
  script_tag(name:"affected", value:"Thunderbird ESR versions 10.x before 10.0.8 on Windows");
  script_tag(name:"insight", value:"The flaws are due to

  - memory corruption issues

  - An error within Chrome Object Wrapper (COW) when handling the
    'InstallTrigger' object can be exploited to access certain privileged
    functions and properties.

  - Use-after-free in the IME State Manager code.

  - combination of invoking full screen mode and navigating backwards in
    history could, in some circumstances, cause a hang or crash due to a
    timing dependent use-after-free pointer reference.

  - Several methods of a feature used for testing (DOMWindowUtils) are not
    protected by existing security checks, allowing these methods to be called
    through script by web pages.

  - An error when GetProperty function is invoked through JSAPI, security
    checking can be bypassed when getting cross-origin properties.

  - An issue with spoofing of the location property.

  - Use-after-free, buffer overflow, and out of bounds read issues.

  - The location property can be accessed by binary plugins through
    top.location and top can be shadowed by Object.define Property as well.
    This can allow for possible XSS attacks through plugins.

  - several memory safety bugs in the browser engine used in mozilla products.");
  script_tag(name:"solution", value:"Upgrade to Thunderbird ESR version 10.0.8 or later.");
  script_tag(name:"summary", value:"Mozilla Thunderbird ESR is prone to multiple vulnerabilities.");
  script_tag(name:"qod_type", value:"registry");
  script_tag(name:"solution_type", value:"VendorFix");
  exit(0);
}

include("version_func.inc");

vers = get_kb_item("Thunderbird-ESR/Win/Ver");
if(vers && vers =~ "^10\.0") {
  if(version_in_range(version:vers, test_version:"10.0", test_version2:"10.0.7")){
    security_message( port: 0, data: "The target host was found to be vulnerable" );
    exit(0);
  }
}

9.6 High

AI Score

Confidence

High

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.713 High

EPSS

Percentile

98.0%