Oval Definition:oval:org.mitre.oval:def:2024
Revision Date:2011-02-21Version:5
Title:Mozilla JavaScript Execution in Mail When Forwarding In-line
Description:The WYSIWYG rendering engine ("rich mail" editor) in Mozilla Thunderbird 1.0.7 and earlier allows user-assisted attackers to bypass javascript security settings and obtain sensitive information or cause a crash via an e-mail containing a javascript URI in the SRC attribute of an IFRAME tag, which is executed when the user edits the e-mail.
Family:windowsClass:vulnerability
Status:ACCEPTEDReference(s):CVE-2006-0884
Platform(s):Microsoft Windows 2000
Microsoft Windows Server 2003
Microsoft Windows XP
Product(s):mozilla
Definition Synopsis
  • Mozilla Thunderbird version 1.0.7 or earlier is installed
  • Mozilla Thunderbird version 1.0.7 or earlier is installed
  • AND Mozilla Thunderbird version 1.0.7 or earlier is installed
  • OR Mozilla Thunderbird version 1.5 is installed and has NOT been patched with version 1.5.0.2
  • Thunderbird version 1.5 or earlier is installed
  • AND Mozilla Thunderbird version 1.5 is installed
  • AND NOT The version of thunderbird.exe is greater than or equal to 1.8.20060.30803 (v1.5.0.2)
  • OR SeaMonkey version 1.0 or earlier is installed
  • SeaMonkey version 1.0 or earlier is installed
  • AND SeaMonkey version 1.0 or earlier is installed
  • OR Mozilla Suite version 1.7.12 or earlier is installed
  • Mozilla Suite version 1.7.12 or earlier is installed
  • AND Mozilla Suite version 1.7.12 or earlier is installed
  • BACK