Lucene search

K
openvasCopyright (C) 2023 Greenbone AGOPENVAS:1361412562310832113
HistoryApr 12, 2023 - 12:00 a.m.

Mozilla Thunderbird Security Advisory (MFSA2023-15) - Mac OS X

2023-04-1200:00:00
Copyright (C) 2023 Greenbone AG
plugins.openvas.org
6
mozilla thunderbird
mac os x
security bypass
vulnerability
upgrade
sensitive information disclosure
arbitrary code execution
denial of service
cve-2023-29531
cve-2023-29533
cve-2023-29535
cve-2023-29536
cve-2023-0547
cve-2023-29479
cve-2023-29539
cve-2023-1945
cve-2023-29548
cve-2023-29550
cve-2023-1999
mozilla maintenance service
fullscreen notification
double-free
libwebp
openpgp messages
content-disposition filename
reflected file download
file download extension
save as dialog
memory corruption
safe browsing code
incorrect optimization
arm64
memory safety bugs

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

7.3

Confidence

High

EPSS

0.002

Percentile

65.4%

Thunderbird is prone to a security bypass
vulnerability.

# SPDX-FileCopyrightText: 2023 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

CPE = "cpe:/a:mozilla:thunderbird";

if(description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.832113");
  script_version("2024-02-15T05:05:40+0000");
  script_cve_id("CVE-2023-29531", "CVE-2023-29533", "CVE-2023-29535", "CVE-2023-29536",
                "CVE-2023-0547", "CVE-2023-29479", "CVE-2023-29539", "CVE-2023-1945",
                "CVE-2023-29548", "CVE-2023-29550", "CVE-2023-1999");
  script_tag(name:"cvss_base", value:"10.0");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:C/I:C/A:C");
  script_tag(name:"last_modification", value:"2024-02-15 05:05:40 +0000 (Thu, 15 Feb 2024)");
  script_tag(name:"severity_vector", value:"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H");
  script_tag(name:"severity_origin", value:"NVD");
  script_tag(name:"severity_date", value:"2023-06-27 08:28:00 +0000 (Tue, 27 Jun 2023)");
  script_tag(name:"creation_date", value:"2023-04-12 14:06:13 +0530 (Wed, 12 Apr 2023)");
  script_name("Mozilla Thunderbird Security Advisory (MFSA2023-15) - Mac OS X");

  script_tag(name:"summary", value:"Thunderbird is prone to a security bypass
  vulnerability.");

  script_tag(name:"vuldetect", value:"Checks if a vulnerable version is present
  on the target host.");

  script_tag(name:"insight", value:"Multiple flaws exist due to,

  - Mozilla Maintenance Service Write-lock bypass

  - Fullscreen notification obscured

  - Double-free in libwebp

  - Hang when processing certain OpenPGP messages

  - Content-Disposition filename truncation leads to Reflected File Download

  - Bypass of file download extension restrictions

  - Windows Save As dialog resolved environment variables

  - Memory Corruption in Safe Browsing Code

  - Incorrect optimization result on ARM64

  - Memory safety bugs fixed in Thunderbird 102.10");

  script_tag(name:"impact", value:"Successful exploitation allow attackers to
  disclose sensitive information, execute arbitrary code and cause denial of
  service condition.");

  script_tag(name:"affected", value:"Mozilla Thunderbird version before 102.10 on Mac OS X.");

  script_tag(name:"solution", value:"Upgrade to Mozilla Thunderbird version 102.10
  or later, Please see the references for more information.");

  script_tag(name:"solution_type", value:"VendorFix");
  script_tag(name:"qod_type", value:"executable_version");
  script_xref(name:"URL", value:"https://www.mozilla.org/en-US/security/advisories/mfsa2023-15/");
  script_category(ACT_GATHER_INFO);
  script_copyright("Copyright (C) 2023 Greenbone AG");
  script_family("General");
  script_dependencies("gb_mozilla_prdts_detect_macosx.nasl");
  script_mandatory_keys("Thunderbird/MacOSX/Version");
  exit(0);
}
include("host_details.inc");
include("version_func.inc");

if( ! infos = get_app_version_and_location( cpe:CPE, exit_no_version:TRUE ) ) exit( 0 );
tbVer = infos['version'];
tbPath = infos['location'];

if(version_is_less(version:tbVer, test_version:"102.10"))
{
  report = report_fixed_ver(installed_version:tbVer, fixed_version:"102.10", install_path:tbPath);
  security_message(data:report);
  exit(0);
}

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

7.3

Confidence

High

EPSS

0.002

Percentile

65.4%