Mozilla Thunderbird ESR Multiple Vulnerabilities -01 Apr13 (Mac OS X)

Summary
This host is installed with Mozilla Thunderbird ESR and is prone to multiple vulnerabilities.
Impact
Successful exploitation will allow attackers to execute arbitrary code, memory corruption, bypass certain security restrictions and compromise a user's system. Impact Level: System/Application
Solution
Upgrade to Mozilla Thunderbird ESR version 17.0.5 or later, For updates refer to http://www.mozilla.com/en-US/thunderbird
Insight
- Unspecified vulnerabilities in the browser engine - Buffer overflow in the Mozilla Maintenance Service - Untrusted search path vulnerability while handling dll files - Improper validation of address bar during history navigation - Integer signedness error in the 'pixman_fill_sse2' function in 'pixman-sse2.c' in Pixman - Error in 'CERT_DecodeCertPackage' function in Mozilla Network Security Services (NSS) - The System Only Wrapper (SOW) implementation does not prevent use of the cloneNode method for cloning a protected node
Affected
Mozilla Thunderbird ESR version 17.x before 17.0.5 on Mac OS X
References