CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
EPSS
Percentile
97.4%
Several vulnerabilities have been discovered in Icedove, an unbranded version of the Thunderbird mail/news client.
CVE-2010-1585 Roberto Suggi Liverani discovered that the sanitising performed by ParanoidFragmentSink was incomplete.
CVE-2011-0051 Zach Hoffmann discovered that incorrect parsing of recursive eval() calls could lead to attackers forcing acceptance of a confirmation dialogue.
CVE-2011-0053 Crashes in the layout engine may lead to the execution of arbitrary code.
CVE-2011-0054, CVE-2010-0056 Christian Holler discovered buffer overflows in the JavaScript engine, which could allow the execution of arbitrary code.
CVE-2011-0055 ‘regenrecht’ and Igor Bukanov discovered a use-after-free error in the JSON-Implementation, which could lead to the execution of arbitrary code.
CVE-2011-0057 Daniel Kozlowski discovered that incorrect memory handling the web workers implementation could lead to the execution of arbitrary code.
CVE-2011-0059 Peleus Uhley discovered a cross-site request forgery risk in the plugin code.
As indicated in the Lenny (oldstable) release notes, security support for the Icedove packages in the oldstable needed to be stopped before the end of the regular Lenny security maintenance life cycle. You are strongly encouraged to upgrade to stable or switch to a different mail client.
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from Debian Security Advisory DSA-2187. The text
# itself is copyright (C) Software in the Public Interest, Inc.
#
include('deprecated_nasl_level.inc');
include('compat.inc');
if (description)
{
script_id(52619);
script_version("1.18");
script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/04");
script_cve_id("CVE-2010-1585", "CVE-2011-0051", "CVE-2011-0053", "CVE-2011-0054", "CVE-2011-0055", "CVE-2011-0056", "CVE-2011-0057", "CVE-2011-0059");
script_bugtraq_id(46643, 46645, 46648, 46650, 46652, 46661, 46663);
script_xref(name:"DSA", value:"2187");
script_name(english:"Debian DSA-2187-1 : icedove - several vulnerabilities");
script_summary(english:"Checks dpkg output for the updated package");
script_set_attribute(
attribute:"synopsis",
value:"The remote Debian host is missing a security-related update."
);
script_set_attribute(
attribute:"description",
value:
"Several vulnerabilities have been discovered in Icedove, an unbranded
version of the Thunderbird mail/news client.
- CVE-2010-1585
Roberto Suggi Liverani discovered that the sanitising
performed by ParanoidFragmentSink was incomplete.
- CVE-2011-0051
Zach Hoffmann discovered that incorrect parsing of
recursive eval() calls could lead to attackers forcing
acceptance of a confirmation dialogue.
- CVE-2011-0053
Crashes in the layout engine may lead to the execution
of arbitrary code.
- CVE-2011-0054, CVE-2010-0056
Christian Holler discovered buffer overflows in the
JavaScript engine, which could allow the execution of
arbitrary code.
- CVE-2011-0055
'regenrecht' and Igor Bukanov discovered a
use-after-free error in the JSON-Implementation, which
could lead to the execution of arbitrary code.
- CVE-2011-0057
Daniel Kozlowski discovered that incorrect memory
handling the web workers implementation could lead to
the execution of arbitrary code.
- CVE-2011-0059
Peleus Uhley discovered a cross-site request forgery
risk in the plugin code.
As indicated in the Lenny (oldstable) release notes, security support
for the Icedove packages in the oldstable needed to be stopped before
the end of the regular Lenny security maintenance life cycle. You are
strongly encouraged to upgrade to stable or switch to a different mail
client."
);
script_set_attribute(
attribute:"see_also",
value:"https://security-tracker.debian.org/tracker/CVE-2010-1585"
);
script_set_attribute(
attribute:"see_also",
value:"https://security-tracker.debian.org/tracker/CVE-2011-0051"
);
script_set_attribute(
attribute:"see_also",
value:"https://security-tracker.debian.org/tracker/CVE-2011-0053"
);
script_set_attribute(
attribute:"see_also",
value:"https://security-tracker.debian.org/tracker/CVE-2011-0054"
);
script_set_attribute(
attribute:"see_also",
value:"https://security-tracker.debian.org/tracker/CVE-2010-0056"
);
script_set_attribute(
attribute:"see_also",
value:"https://security-tracker.debian.org/tracker/CVE-2011-0055"
);
script_set_attribute(
attribute:"see_also",
value:"https://security-tracker.debian.org/tracker/CVE-2011-0057"
);
script_set_attribute(
attribute:"see_also",
value:"https://security-tracker.debian.org/tracker/CVE-2011-0059"
);
script_set_attribute(
attribute:"see_also",
value:"https://packages.debian.org/source/squeeze/icedove"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.debian.org/security/2011/dsa-2187"
);
script_set_attribute(
attribute:"solution",
value:
"Upgrade the icedove packages.
For the stable distribution (squeeze), this problem has been fixed in
version 3.0.11-1+squeeze1."
);
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
script_set_cvss_temporal_vector("CVSS2#E:ND/RL:OF/RC:C");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_set_attribute(attribute:"exploit_available", value:"false");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:icedove");
script_set_attribute(attribute:"cpe", value:"cpe:/o:debian:debian_linux:6.0");
script_set_attribute(attribute:"patch_publication_date", value:"2011/03/09");
script_set_attribute(attribute:"plugin_publication_date", value:"2011/03/11");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_copyright(english:"This script is Copyright (C) 2011-2021 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_family(english:"Debian Local Security Checks");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/Debian/release", "Host/Debian/dpkg-l");
exit(0);
}
include("audit.inc");
include("debian_package.inc");
if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
if (!get_kb_item("Host/Debian/release")) audit(AUDIT_OS_NOT, "Debian");
if (!get_kb_item("Host/Debian/dpkg-l")) audit(AUDIT_PACKAGE_LIST_MISSING);
flag = 0;
if (deb_check(release:"6.0", prefix:"icedove", reference:"3.0.11-1+squeeze1")) flag++;
if (deb_check(release:"6.0", prefix:"icedove-dbg", reference:"3.0.11-1+squeeze1")) flag++;
if (deb_check(release:"6.0", prefix:"icedove-dev", reference:"3.0.11-1+squeeze1")) flag++;
if (flag)
{
if (report_verbosity > 0) security_hole(port:0, extra:deb_report_get());
else security_hole(0);
exit(0);
}
else audit(AUDIT_HOST_NOT, "affected");
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1585
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0051
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0053
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0054
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0055
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0056
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0057
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0059
packages.debian.org/source/squeeze/icedove
security-tracker.debian.org/tracker/CVE-2010-0056
security-tracker.debian.org/tracker/CVE-2010-1585
security-tracker.debian.org/tracker/CVE-2011-0051
security-tracker.debian.org/tracker/CVE-2011-0053
security-tracker.debian.org/tracker/CVE-2011-0054
security-tracker.debian.org/tracker/CVE-2011-0055
security-tracker.debian.org/tracker/CVE-2011-0057
security-tracker.debian.org/tracker/CVE-2011-0059
www.debian.org/security/2011/dsa-2187