27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Thunderbird 3.0.x < 3.0.6 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5608 FAMILY: SMTP Clients RISK: HIGH NESSUS ID:47783<br />

Description: Synopsis :\n\nThe remote host has a web browser installed that is vulnerable to multiple<br />

attack vectors.\n\nFor your information, the observed version of Thunderbird is<br />

%L.\n\nVersions of Thunderbird 3.0.x earlier than 3.0.6 are potentially affected by multiple<br />

vulnerabilities :\n\n Multiple memory safety bugs could result in memory corruption,<br />

potentially resulting in arbitrary code execution. (MFSA 2010-34)\n\n - The array class<br />

used to store CSS values is affected by an integer overflow vulnerability. (MFSA<br />

2010-39)\n\n - An integer overflow vulnerability exists in the 'selection' attribute of the<br />

XUL tree element. (MFSA 2010-40)\n\n - A buffer overflow exists in Mozilla graphics<br />

code could lead to arbitrary code execution. (MFSA 2010-41)\n\n - It is possible to read<br />

and parse resources from other domains even when the content is not valid javascript<br />

leading to cross-domain data disclosure. (MFSA 2010-42)\n\n - It is possible to read data<br />

across domains by injecting bogus CSS selectors into a target site. (MFSA 2010-46)\n\n -<br />

Potentially sensitive URL parameters could be leaked across domains via script errors.<br />

(MFSA 2010-47)<br />

Solution: Upgrade to Mozilla Thunderbird 3.0.6 or later.<br />

CVE-2010-2754<br />

Thunderbird 3.1.x < 3.1.1 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5609 FAMILY: SMTP Clients RISK: HIGH NESSUS ID:47784<br />

Description: Synopsis :\n\nThe remote host has a web browser installed that is vulnerable to multiple<br />

attack vectors.\n\nFor your information, the observed version of Thunderbird is<br />

%L.\n\nVersions of Thunderbird 3.1.x earlier than 3.1.1 are potentially affected by multiple<br />

vulnerabilities :\n\n Multiple memory safety bugs could result in memory corruption,<br />

potentially resulting in arbitrary code execution. (MFSA 2010-34)\n\n - It may be possible<br />

to run arbitrary JavaScript with chrome privileges using SJOW and fast native function.<br />

(MFSA 2010-38)\n\n - The array class used to store CSS values is affected by an integer<br />

overflow vulnerability. (MFSA 2010-39)\n\n - An integer overflow vulnerability exists in<br />

the 'selection' attribute of the XUL tree element. (MFSA 2010-40)\n\n - A buffer overflow<br />

exists in Mozilla graphics code could lead to arbitrary code execution. (MFSA<br />

2010-41)\n\n - It is possible to read and parse resources from other domains even when the<br />

content is not valid javascript leading to cross-domain data disclosure. (MFSA<br />

2010-42)\n\n - The canvas element can be used to read data from another site leading to a<br />

same-origin bypass vulnerability. (MFSA 2010-43)\n\n - Characters mapped to U+FFFD in<br />

8 bit encodings cause subsequent characteres to dissapear, potentially contributing to<br />

cross-site scripting issues on certain websites. (MFSA 2010-44)\n\n - It is possible to read<br />

data across domains by injecting bogus CSS selectors into a target site. (MFSA<br />

2010-46)\n\n - Potentially sensitive URL parameters could be leaked across domains via<br />

script errors. (MFSA 2010-47)<br />

Solution: Upgrade to Mozilla Thunderbird 3.1.1 or later.<br />

CVE-2010-2754<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1507

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!