Check Point Reference: | CPAI-2006-162 |
Date Published: | 28 Oct 2009 |
Severity: | Medium |
Last Updated: | Tuesday 30 July, 2013 |
Source: | |
Industry Reference: | CVE-2006-0884 |
Protection Provided by: |
Security Gateway |
Who is Vulnerable? | |
Vulnerability Description | Mozilla Thunderbird is an email client application often seen as an alternative to the mainstream Microsoft email clients. Thunderbird supports various email delivering protocols such as SMTP, IMAP and POP3. The program is also capable of reading and composing HTML formatted email messages. A Javascript execution vulnerability exists in the Mozilla Thunderbird application. The vulnerability allows Javascript execution in the composer window regardless of the security restriction settings. This may allow the attacker to execute arbitrary Javascript when a target user replies to a malicious HTML formatted email message. The behaviour of the target system is dependent on the code executed in the Javascript. Only functionality available through Javascript will be available to an attacker. In some cases, it has been observed that the Thunderbird application may terminate as a result of the execution of malicious script. |
This protection will detect and block attempts to exploit this vulnerability
In order for the protection to be activated, update your Security Gateway product to the latest IPS update. For information on how to update IPS, go to SBP-2006-05, click on Protection tab and select the version of your choice.
This protection's log will contain the following information:
Attack Name: NNTP Protection Violation.
Attack Information: Mozilla Thunderbird WYSIWIG engine filtering IFRAME Javascript execution