Summary
This host is installed with Mozilla Thunderbird ESR and is prone to multiple vulnerabilities.
Impact
Successful exploitation will allow attackers to inject scripts and bypass certain security restrictions.
Impact Level: Application
Solution
Upgrade to Thunderbird ESR 10.0.10 or later,
http://www.mozilla.org/en-US/thunderbird
Insight
Multiple errors
- When handling the 'window.location' object.
- Within CheckURL() function of the 'window.location' object, which can be forced to return the wrong calling document and principal.
- Within handling of 'Location' object can be exploited to bypass security wrapper protection.
Affected
Thunderbird ESR version 10.x before 10.0.10 on Mac OS X
References
Severity
Classification
-
CVE CVE-2012-4194, CVE-2012-4195, CVE-2012-4196 -
CVSS Base Score: 5.1
AV:N/AC:H/Au:N/C:P/I:P/A:P
Related Vulnerabilities
- Adobe Reader Multiple Vulnerabilities - Aug07 (Windows)
- Adobe Reader Old Plugin Signature Bypass Vulnerability (Windows)
- Adobe Flex SDK 'SWF' Files Cross-Site Scripting Vulnerability (Windows)
- Apple iTunes Tutorials Window Security Bypass Vulnerability (Windows)
- Apple Safari JavaScript Implementation Information Disclosure Vulnerability (Mac OS X)