Lucene search

K
openvasCopyright (C) 2023 Greenbone AGOPENVAS:1361412562310832343
HistoryAug 03, 2023 - 12:00 a.m.

Mozilla Thunderbird Security Advisories (MFSA2023-29, MFSA2023-32) - Mac OS X

2023-08-0300:00:00
Copyright (C) 2023 Greenbone AG
plugins.openvas.org
3
mozilla thunderbird
security advisories
mac os x
vulnerabilities
cve-2023-4045
cve-2023-4046
cve-2023-4047
cve-2023-4048
cve-2023-4049
cve-2023-4050
cve-2023-4052
cve-2023-4054
cve-2023-4055
cve-2023-4056
cve-2023-4057
offscreen canvas
wasm compilation
clickjacking
domparser
race conditions
storagemanager
full screen notification
privilege escalation
firefox uninstaller
appref-ms files
cookie jar overflow
sensitive information
arbitrary code
denial of service
version 102.14

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.7 High

AI Score

Confidence

Low

0.002 Low

EPSS

Percentile

52.9%

Mozilla Thunderbird is prone to multiple
vulnerabilities.

# SPDX-FileCopyrightText: 2023 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

CPE = "cpe:/a:mozilla:thunderbird";

if(description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.832343");
  script_version("2024-02-15T05:05:40+0000");
  script_cve_id("CVE-2023-4045", "CVE-2023-4046", "CVE-2023-4047", "CVE-2023-4048",
                "CVE-2023-4049", "CVE-2023-4050", "CVE-2023-4052", "CVE-2023-4054",
                "CVE-2023-4055", "CVE-2023-4056", "CVE-2023-4057");
  script_tag(name:"cvss_base", value:"10.0");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:C/I:C/A:C");
  script_tag(name:"last_modification", value:"2024-02-15 05:05:40 +0000 (Thu, 15 Feb 2024)");
  script_tag(name:"severity_vector", value:"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H");
  script_tag(name:"severity_origin", value:"NVD");
  script_tag(name:"severity_date", value:"2023-08-04 18:44:00 +0000 (Fri, 04 Aug 2023)");
  script_tag(name:"creation_date", value:"2023-08-03 15:45:06 +0530 (Thu, 03 Aug 2023)");
  script_name("Mozilla Thunderbird Security Advisories (MFSA2023-29, MFSA2023-32) - Mac OS X");

  script_tag(name:"summary", value:"Mozilla Thunderbird is prone to multiple
  vulnerabilities.");

  script_tag(name:"vuldetect", value:"Checks if a vulnerable version is present
  on the target host.");

  script_tag(name:"insight", value:"Multiple flaws exist due to,

  - Offscreen Canvas could have bypassed cross-origin restrictions.

  - Incorrect value used during WASM compilation.

  - Potential permissions request bypass via clickjacking.

  - Crash in DOMParser due to out-of-memory conditions.

  - Potential race conditions when releasing platform objects.

  - Stack buffer overflow in StorageManager.

  - Full screen notification obscured by file open dialog.

  - File deletion and privilege escalation through Firefox uninstaller.

  - Full screen notification obscured by external program.

  - Lack of warning when opening appref-ms files.

  - Cookie jar overflow caused unexpected cookie jar state.");

  script_tag(name:"impact", value:"Successful exploitation allow attackers to
  disclose sensitive information, execute arbitrary code and cause denial of service
  condition.");

  script_tag(name:"affected", value:"Mozilla Thunderbird version before
  102.14 on Mac OS X.");

  script_tag(name:"solution", value:"Upgrade to version 102.14
  or later, Please see the references for more information.");

  script_tag(name:"solution_type", value:"VendorFix");
  script_tag(name:"qod_type", value:"executable_version");
  script_xref(name:"URL", value:"https://www.mozilla.org/en-US/security/advisories/mfsa2023-32/");
  script_category(ACT_GATHER_INFO);
  script_copyright("Copyright (C) 2023 Greenbone AG");
  script_family("General");
  script_dependencies("gb_mozilla_prdts_detect_macosx.nasl");
  script_mandatory_keys("Thunderbird/MacOSX/Version");
  exit(0);
}

include("host_details.inc");
include("version_func.inc");

if(!infos = get_app_version_and_location( cpe:CPE, exit_no_version:TRUE))
  exit(0);

vers = infos["version"];
path = infos["location"];

if(version_is_less(version:vers, test_version:"102.14")) {
  report = report_fixed_ver(installed_version:vers, fixed_version:"102.14", install_path:path);
  security_message(port:0, data:report);
  exit(0);
}

exit(99);

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.7 High

AI Score

Confidence

Low

0.002 Low

EPSS

Percentile

52.9%