Summary
The host is installed with Mozilla Thunderbird and is prone to multiple vulnerabilities.
Impact
Successful exploitation could result in remote arbitrary code execution, bypass security restrictions, spoofing attacks, sensitive information disclosure, and JavaScript code that can be executed with the privileges of the signed user.
Impact Level: System
Solution
Upgrade to Thunderbird version 2.0.0.18
http://www.mozilla.com/en-US/thunderbird/all.html
Affected
Thunderbird version prior to 2.0.0.18 on Linux.
References
- http://www.mozilla.org/security/announce/2008/mfsa2008-48.html
- http://www.mozilla.org/security/announce/2008/mfsa2008-50.html
- http://www.mozilla.org/security/announce/2008/mfsa2008-52.html
- http://www.mozilla.org/security/announce/2008/mfsa2008-55.html
- http://www.mozilla.org/security/announce/2008/mfsa2008-56.html
- http://www.mozilla.org/security/announce/2008/mfsa2008-58.html
Updated on 2015-03-25
Severity
Classification
-
CVE CVE-2008-5012, CVE-2008-5014, CVE-2008-5016, CVE-2008-5017, CVE-2008-5018, CVE-2008-5021, CVE-2008-5022, CVE-2008-5024, CVE-2008-5052 -
CVSS Base Score: 10.0
AV:N/AC:L/Au:N/C:C/I:C/A:C
Related Vulnerabilities
- Adobe AIR Multiple Vulnerabilities-01 Jun14 (Mac OS X)
- Adobe Air Code Execution and DoS Vulnerabilities (MAC OS X)
- Adobe Acrobat and Reader 'printSeps()' Function Heap Corruption Vulnerability
- Adobe AIR Multiple Vulnerabilities-01 Jan15 (Windows)
- Active Perl Locale::Maketext Module Multiple Code Injection Vulnerabilities (Windows)