Mozilla Thunderbird Multiple Vulnerability Jun-09 (Win)

Summary
The host is installed with Thunderbird, which is prone to multiple vulnerabilities.
Impact
Successful exploitation could result in remote arbitrary JavaScript code execution, spoofing attacks, sensitive information disclosure, and can cause denial of service. Impact Level: System/Application
Solution
Upgrade to Firefox version 2.0.0.22 http://www.mozilla.com/en-US/thunderbird/all.html
Insight
- Error in js/src/xpconnect/src/xpcwrappedjsclass.cpp file will allow attacker to execute arbitrary web script. - An error when handling a non-200 response returned by a proxy in reply to a CONNECT request, which could cause the body of the response to be rendered within the context of the request 'Host:' header. - An error when handling event listeners attached to an element whose owner document is null. - Due to content-loading policies not being checked before loading external script files into XUL documents, which could be exploited to bypass restrictions. - An error when handling event listeners attached to an element whose owner document is null. - Error exists in JavaScript engine is caused via vectors related to js_LeaveSharpObject, ParseXMLSource, and a certain assertion in jsinterp.c. - Error exists via vectors involving 'double frame construction.'
Affected
Thunderbire version prior to 2.0.0.22 on Windows.
References