Free and open-source vulnerability scanner

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

Mozilla Thunderbird Multiple Vulnerability Jun-09 (Linux)

Information

Severity

Severity

Critical

Family

Family

General

CVSSv2 Base

CVSSv2 Base

9.3

CVSSv2 Vector

CVSSv2 Vector

AV:N/AC:M/Au:N/C:C/I:C/A:C

Solution Type

Solution Type

Vendor Patch

Created

Created

14 years ago

Modified

Modified

4 years ago

Summary

The host is installed with Thunderbird, which is prone to multiple vulnerabilities.

Insight

Insight

- Error in js/src/xpconnect/src/xpcwrappedjsclass.cpp file will allow attacker to execute arbitrary web script. - An error when handling a non-200 response returned by a proxy in reply to a CONNECT request, which could cause the body of the response to be rendered within the context of the request 'Host:' header. - An error when handling event listeners attached to an element whose owner document is null. - Due to content-loading policies not being checked before loading external script files into XUL documents, which could be exploited to bypass restrictions. - An error when handling event listeners attached to an element whose owner document is null. - Error exists in JavaScript engine is caused via vectors related to js_LeaveSharpObject, ParseXMLSource, and a certain assertion in jsinterp.c. - Error exists via vectors involving 'double frame construction.'

Affected Software

Affected Software

Thunderbire version prior to 2.0.0.22 on Linux.

Solution

Solution

Upgrade to Firefox version 2.0.0.22.