CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
EPSS
Percentile
99.7%
The remote version of Mozilla Thunderbird suffers from various security issues, at least one of which could lead to execution of arbitrary code on the affected host subject to the user’s privileges.
#
# (C) Tenable Network Security, Inc.
#
include("compat.inc");
if (description)
{
script_id(22370);
script_version("1.27");
script_cvs_date("Date: 2018/07/16 14:09:15");
script_cve_id(
"CVE-2006-4253",
"CVE-2006-4340",
"CVE-2006-4565",
"CVE-2006-4566",
"CVE-2006-4567",
"CVE-2006-4570",
"CVE-2006-4571"
);
script_bugtraq_id(19488, 19534, 20042);
script_name(english:"Mozilla Thunderbird < 1.5.0.7 Multiple Vulnerabilities");
script_summary(english:"Checks version of Mozilla Thunderbird");
script_set_attribute(attribute:"synopsis", value:
"The remote Windows host contains a mail client that is affected by
multiple vulnerabilities.");
script_set_attribute(attribute:"description", value:
"The remote version of Mozilla Thunderbird suffers from various
security issues, at least one of which could lead to execution of
arbitrary code on the affected host subject to the user's privileges.");
script_set_attribute(attribute:"see_also", value:"https://www.mozilla.org/en-US/security/advisories/mfsa2006-57/");
script_set_attribute(attribute:"see_also", value:"https://www.mozilla.org/en-US/security/advisories/mfsa2006-58/");
script_set_attribute(attribute:"see_also", value:"https://www.mozilla.org/en-US/security/advisories/mfsa2006-59/");
script_set_attribute(attribute:"see_also", value:"https://www.mozilla.org/en-US/security/advisories/mfsa2006-60/");
script_set_attribute(attribute:"see_also", value:"https://www.mozilla.org/en-US/security/advisories/mfsa2006-63/");
script_set_attribute(attribute:"see_also", value:"https://www.mozilla.org/en-US/security/advisories/mfsa2006-64/");
script_set_attribute(attribute:"solution", value:"Upgrade to Mozilla Thunderbird 1.5.0.7 or later.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
script_set_attribute(attribute:"exploit_available", value:"true");
script_cwe_id(20, 119, 264);
script_set_attribute(attribute:"plugin_publication_date", value:"2006/09/16");
script_set_attribute(attribute:"vuln_publication_date", value:"2006/08/12");
script_set_attribute(attribute:"patch_publication_date", value:"2006/09/14");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"cpe:/a:mozilla:thunderbird");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"Windows");
script_copyright(english:"This script is Copyright (C) 2006-2018 Tenable Network Security, Inc.");
script_dependencies("mozilla_org_installed.nasl");
script_require_keys("Mozilla/Thunderbird/Version");
exit(0);
}
include("mozilla_version.inc");
port = get_kb_item_or_exit("SMB/transport");
installs = get_kb_list("SMB/Mozilla/Thunderbird/*");
if (isnull(installs)) audit(AUDIT_NOT_INST, "Thunderbird");
mozilla_check_version(installs:installs, product:'thunderbird', esr:FALSE, fix:'1.5.0.7', severity:SECURITY_HOLE);
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4253
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4340
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4565
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4566
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4567
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4570
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4571
www.mozilla.org/en-US/security/advisories/mfsa2006-57/
www.mozilla.org/en-US/security/advisories/mfsa2006-58/
www.mozilla.org/en-US/security/advisories/mfsa2006-59/
www.mozilla.org/en-US/security/advisories/mfsa2006-60/
www.mozilla.org/en-US/security/advisories/mfsa2006-63/
www.mozilla.org/en-US/security/advisories/mfsa2006-64/