VRDA Feed by JPCERT/CC
  Vulnerability Response Decision Assistance Feed : Information for vulnerability impact analysis
[ about VRDA Feed | JPCERT/CC



 
Vulnerability Analysis Result (Revision No : 1) [ Download XML
VRDA-091215-001
Mozilla Thunderbird Floating Points Memory Corruption Vulnerability
http://www.vupen.com/english/advisories/2009/3503

A vulnerability has been identified in Mozilla Thunderbird, which could be exploited by attackers to compromise a vulnerable system. This issue is caused by a memory corruption error when processing floating point numbers e.g. via the Lightning or Thunderbrowse Add-ons, which could allow remote attackers to crash an affected application or execute arbitrary code by tricking a user into opening a malicious ICS file or visiting a specially crafted web page.




About This Analysis Information
Analysis Information Provider:
JPCERT/CC
First Published:
2009-12-15
Source Information Category:
Other (news, forums, etc.)
Last Updated:
2009-12-15




Affected Product Tags
cpe:/a:mozilla:thunderbird     (Mozilla Thunderbird)
 


Vulnerability Analysis Results
[Information Source Reliability] [?]
X Low [?]

Medium [?]
High [?]

[Impact Level] [?]
Low [?]

Low-Medium [?]
Medium-High [?]
X High [?]

[Access Required] [?]
Physical [?]

Local [?]
Non-routed [?]
X Routed [?]

[Authentication] [?]
Privileged [?]

Standard [?]
Limited [?]
X None or Unnecessary [?]

[User Interaction Required] [?]
Complex [?]

X Simple [?]
None [?]

[Technical Difficulty] [?]
High [?]

Medium-High [?]
Low-Medium [?]
Low [?]

[Availability of Remediation] [?]
Official Patch [?]

Official Workaround [?]
X Unofficial Patch [?]
None [?]

[Incident Activity] [?]
None [?]

X Exploit or PoC [?]
Activity Observed [?]

Alternatives




References

Copyright © 2009 JPCERT/CC All Rights Reserved.