CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
AI Score
Confidence
High
EPSS
Percentile
98.5%
Mozilla Thunderbird is prone to multiple vulnerabilities.
# SPDX-FileCopyrightText: 2008 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only
if(description)
{
script_oid("1.3.6.1.4.1.25623.1.0.800059");
script_version("2024-02-16T05:06:55+0000");
script_tag(name:"last_modification", value:"2024-02-16 05:06:55 +0000 (Fri, 16 Feb 2024)");
script_tag(name:"creation_date", value:"2008-11-21 14:18:03 +0100 (Fri, 21 Nov 2008)");
script_tag(name:"cvss_base", value:"10.0");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:C/I:C/A:C");
script_cve_id("CVE-2008-5012", "CVE-2008-5014", "CVE-2008-5016", "CVE-2008-5017",
"CVE-2008-5018", "CVE-2008-5021", "CVE-2008-5022", "CVE-2008-5024",
"CVE-2008-5052");
script_name("Mozilla Thunderbird Multiple Vulnerabilities (Nov 2008) - Windows");
script_xref(name:"URL", value:"http://www.mozilla.org/security/announce/2008/mfsa2008-48.html");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/32281");
script_xref(name:"URL", value:"http://www.mozilla.org/security/announce/2008/mfsa2008-50.html");
script_xref(name:"URL", value:"http://www.mozilla.org/security/announce/2008/mfsa2008-52.html");
script_xref(name:"URL", value:"http://www.mozilla.org/security/announce/2008/mfsa2008-55.html");
script_xref(name:"URL", value:"http://www.mozilla.org/security/announce/2008/mfsa2008-56.html");
script_xref(name:"URL", value:"http://www.mozilla.org/security/announce/2008/mfsa2008-58.html");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (C) 2008 Greenbone AG");
script_family("General");
script_dependencies("gb_thunderbird_detect_portable_win.nasl");
script_mandatory_keys("Thunderbird/Win/Ver");
script_tag(name:"impact", value:"Successful exploitation could result in remote arbitrary code execution,
bypass security restrictions, spoofing attacks, sensitive information
disclosure, and JavaScript code that can be executed with the privileges of the signed user.");
script_tag(name:"affected", value:"Thunderbird version prior to 2.0.0.18 on Windows.");
script_tag(name:"solution", value:"Upgrade to Thunderbird version 2.0.0.18.");
script_tag(name:"summary", value:"Mozilla Thunderbird is prone to multiple vulnerabilities.");
script_tag(name:"qod_type", value:"registry");
script_tag(name:"solution_type", value:"VendorFix");
exit(0);
}
include("version_func.inc");
tbVer = get_kb_item("Thunderbird/Win/Ver");
if(!tbVer){
exit(0);
}
if(version_is_less(version:tbVer, test_version:"2.0.0.18")){
report = report_fixed_ver(installed_version:tbVer, fixed_version:"2.0.0.18");
security_message(port: 0, data: report);
}
www.mozilla.org/security/announce/2008/mfsa2008-48.html
www.mozilla.org/security/announce/2008/mfsa2008-50.html
www.mozilla.org/security/announce/2008/mfsa2008-52.html
www.mozilla.org/security/announce/2008/mfsa2008-55.html
www.mozilla.org/security/announce/2008/mfsa2008-56.html
www.mozilla.org/security/announce/2008/mfsa2008-58.html
www.securityfocus.com/bid/32281