Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Windows >> Mozilla Thunderbird < 1.0.2


Vulnerability Assessment Details

Mozilla Thunderbird < 1.0.2

Vulnerability Assessment Summary
Acertains the version of Mozilla Thunderbird

Detailed Explanation for this Vulnerability Assessment

The remote host is using Mozilla Thunderbird, an email client.

The remote version of this software is vulnerable to a heap overflow
vulnerability when it processes GIF images.

A possible hacker may exploit this flaw to execute arbitrary flaw on the remote
host. To exploit this flaw, a possible hacker would need to send a malformed
GIF image to a victim on the remote host and wait for him to open it.

Solution : Upgrade to Mozilla ThunderBird 1.0.2
Network Security Threat Level: High

Networks Security ID: 12881

Vulnerability Assessment Copyright: This script is Copyright (C) 2005-2006 Tenable Network Security

Cables, Connectors

Cisco Linksys E1000 Wireless N Router 300MBPS 4-PORT 10/100 V2.1
$35.0
Cisco Linksys E1000 Wireless N Router 300MBPS 4-PORT 10/100 V2.1 pictureWS-C2940-8TT-S - CISCO CATALYST 2940 SERIES ETHERNET SWITCH
$50.51
WS-C2940-8TT-S - CISCO CATALYST 2940 SERIES ETHERNET SWITCH picture50CM 32pin SAS to 4 x SATA 32-pin SFF-8484 7-pin M-M by BattleBorn Cable
$9.6
50CM 32pin SAS to 4 x SATA 32-pin SFF-8484 7-pin M-M by BattleBorn Cable picture30" 32pin SAS to 4 x SATA 32-pin SFF-8484 7-pin M-M by BattleBorn Cable 50CM
$9.99
30


Discussions

No Discussions have been posted on this vulnerability.