Summary
The host is installed with Mozilla Thunderbird and is prone to multiple vulnerabilities.
Impact
Successful exploitation could result in remote arbitrary code execution, bypass security restrictions, spoofing attacks, sensitive information disclosure, and JavaScript code that can be executed with the privileges of the signed user.
Impact Level: System
Solution
Upgrade to Thunderbird version 2.0.0.18
http://www.mozilla.com/en-US/thunderbird/all.html
Affected
Thunderbird version prior to 2.0.0.18 on Linux.
References
- http://www.mozilla.org/security/announce/2008/mfsa2008-48.html
- http://www.mozilla.org/security/announce/2008/mfsa2008-50.html
- http://www.mozilla.org/security/announce/2008/mfsa2008-52.html
- http://www.mozilla.org/security/announce/2008/mfsa2008-55.html
- http://www.mozilla.org/security/announce/2008/mfsa2008-56.html
- http://www.mozilla.org/security/announce/2008/mfsa2008-58.html
Updated on 2015-03-25
Severity
Classification
-
CVE CVE-2008-5012, CVE-2008-5014, CVE-2008-5016, CVE-2008-5017, CVE-2008-5018, CVE-2008-5021, CVE-2008-5022, CVE-2008-5024, CVE-2008-5052 -
CVSS Base Score: 10.0
AV:N/AC:L/Au:N/C:C/I:C/A:C
Related Vulnerabilities
- Adobe Air Multiple Vulnerabilities -01 August 12 (Windows)
- Adobe Acrobat Multiple Vulnerabilities -01 Jan 13 (Mac OS X)
- Adobe AIR Multiple Vulnerabilities(APSB14-22)-(Windows)
- Adobe Flash Player Arbitrary Code Execution Vulnerability (Linux)
- Adobe AIR Code Execution and DoS Vulnerabilities Nov13 (Windows)