Free and open-source vulnerability scanner

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

Mozilla Thunderbird Security Updates( mfsa_2017-30_2017-30 )-Windows

Information

Severity

Severity

Critical

Family

Family

General

CVSSv2 Base

CVSSv2 Base

9.3

CVSSv2 Vector

CVSSv2 Vector

AV:N/AC:M/Au:N/C:C/I:C/A:C

Solution Type

Solution Type

Vendor Patch

Created

Created

6 years ago

Modified

Modified

4 years ago

Summary

This host is installed with Mozilla Thunderbird and is prone to multiple vulnerabilities.

Insight

Insight

The multiple flaws exist due to, - Buffer overflow error when drawing and validating elements with ANGLE library using Direct 3D 9. - JavaScript Execution via RSS in mailbox:// origin. - Local path string can be leaked from RSS feed. - RSS Feed vulnerable to new line Injection. - Mailsploit part 1: From address with encoded null character is cut off in message header display.

Affected Software

Affected Software

Mozilla Thunderbird version before 52.5.2 on Windows.

Detection Method

Detection Method

Checks if a vulnerable version is present on the target host.

Solution

Solution

Upgrade to Mozilla Thunderbird version 52.5.2

Common Vulnerabilities and Exposures (CVE)