Want to join the Secunia Security Team?
Secunia offers a position as a security specialist, where your daily work involves reverse engineering of software and exploit code, auditing of source code, and analysis of vulnerability reports.
TITLE: Thunderbird Multiple Vulnerabilities
SECUNIA ADVISORY ID: SA20382
VERIFY ADVISORY: http://secunia.com/advisories/20382/
CRITICAL: Highly critical
IMPACT: Security Bypass, Cross Site Scripting, System access
WHERE: >From remote
SOFTWARE: Mozilla Thunderbird 0.x http://secunia.com/product/2637/ Mozilla Thunderbird 1.0.x http://secunia.com/product/9735/ Mozilla Thunderbird 1.5.x http://secunia.com/product/4652/
DESCRIPTION: Multiple vulnerabilities have been reported in Thunderbird, which can be exploited by malicious people to bypass certain security restrictions, conduct cross-site scripting and HTTP response smuggling attacks, and potentially compromise a user's system.
For more information, see vulnerabilities #1, #2, #3, #5, #6, #7, and
The following vulnerability has also been reported:
The vulnerability is caused due to a double-free error within the processing of large VCards with invalid base64 characters. This may be exploited to execute arbitrary code.
SOLUTION: Update to version 188.8.131.52. http://www.mozilla.com/thunderbird/
PROVIDED AND/OR DISCOVERED BY: Masatoshi Kimura
ORIGINAL ADVISORY: http://www.mozilla.org/security/announce/2006/mfsa2006-40.html
OTHER REFERENCES: SA20376: http://secunia.com/advisories/20376/
About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.
Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.