Summary
This host is installed with Mozilla
Thunderbird and is prone to multiple vulnerabilities.
Impact
Successful exploitation will allow remote
attackers to bypass certain security restrictions, and compromise a user's system.
Impact Level: System/Application
Solution
Upgrade to Mozilla Thunderbird version
31.4 or later, For updates refer https://www.mozilla.org/en-US/thunderbird
Insight
Multiple flaws exist due to,
- An error when handling a '407 Proxy Authentication' response with a 'Set-Cookie' header from a web proxy.
- Some unspecified errors.
- An error when handling a request from 'navigator.sendBeacon' API interface function.
Affected
Mozilla Thunderbird before version 31.4
on Mac OS X
Detection
Get the installed version with the
help of detect NVT and check the version is vulnerable or not.
References
Severity
Classification
-
CVE CVE-2014-8634, CVE-2014-8638, CVE-2014-8639 -
CVSS Base Score: 7.5
AV:N/AC:L/Au:N/C:P/I:P/A:P
Related Vulnerabilities
- Adobe AIR Multiple Vulnerabilities -02 April 13 (Windows)
- Adobe Acrobat and Reader PDF Handling Multiple Vulnerabilities (Linux)
- Adobe Flash Player Arbitrary Code Execution Vulnerability - 01 Feb14 (Linux)
- Adobe AIR Multiple Vulnerabilities-01 Jan15 (Windows)
- Adobe AIR Code Execution and DoS Vulnerabilities Nov13 (Windows)