Summary
The host is installed with Mozilla Thunderbird and is prone to multiple vulnerabilities.
Vulnerability:
Refer to the reference links for more information on the vulnerabilities.
Impact
Successful exploitation could result in remote arbitrary code execution, bypass security restrictions, sensitive information disclosure, cross site scripting attacks and execute JavaScript code with chrome privileges.
Impact Level: System
Solution
Upgrade to Thunderbird version 2.0.0.19
http://www.mozilla.com/en-US/thunderbird/all.html
Affected
Thunderbird version prior to 2.0.0.19 on Windows.
References
- http://www.mozilla.org/security/announce/2008/mfsa2008-60.html
- http://www.mozilla.org/security/announce/2008/mfsa2008-61.html
- http://www.mozilla.org/security/announce/2008/mfsa2008-64.html
- http://www.mozilla.org/security/announce/2008/mfsa2008-65.html
- http://www.mozilla.org/security/announce/2008/mfsa2008-66.html
- http://www.mozilla.org/security/announce/2008/mfsa2008-67.html
- http://www.mozilla.org/security/announce/2008/mfsa2008-68.html
Updated on 2015-03-25
Severity
Classification
-
CVE CVE-2008-5500, CVE-2008-5501, CVE-2008-5502, CVE-2008-5503, CVE-2008-5506, CVE-2008-5507, CVE-2008-5508, CVE-2008-5510, CVE-2008-5511, CVE-2008-5512 -
CVSS Base Score: 10.0
AV:N/AC:L/Au:N/C:C/I:C/A:C
Related Vulnerabilities
- Adobe AIR Code Execution and DoS Vulnerabilities Nov13 (Mac OS X)
- Adobe Acrobat Multiple Unspecified Vulnerabilities - Mac OS X
- Adobe Acrobat Sandbox Bypass Vulnerability - Aug14 (Windows)
- Adobe Air Multiple Vulnerabilities - October 12 (Windows)
- Adobe Acrobat Multiple Vulnerabilities -01 Jan 13 (Windows)