Mozilla SeaMonkey < 2.24 Multiple Vulnerabilities
PVS ID: 8099 FAMILY: Web Clients RISK: HIGH NESSUS ID:72331
Description: Synopsis :\n\nThe remote host has a web browser installed that is vulnerable to multiple attack vectors.\n\nVersions of Mozilla SeaMonkey earlier than 2.24 are prone to the following vulnerabilities:\n\n - Memory issues exist in the browser engine that could result in a denial of service or arbitrary code execution. (CVE-2014-1477, CVE-2014-1478)\n\n - An error exists related to System Only Wrappers (SOW) and the XML Binding Language (XBL) that could allow XUL content to be disclosed. (CVE-2014-1479)\n\n - An error exists related to the 'open file' dialog that could allow users to take unintended actions. (CVE-2014-1480)\n\n - An error exists related to the JavaScript engine and 'window' object handling that has unspecified impact. (CVE-2014-1481)\n\n - An error exists related to 'RasterImage' and image decoding that could allow application crashes and possibly arbitrary code execution. (CVE-2014-1482)\n\n - Errors exist related to IFrames, 'document.caretPositionFromPoint' and 'document.elementFromPoint' that could allow cross-origin information disclosure. (CVE-2014-1483)\n\n - An error exists related to the Content Security Policy (CSP) and XSLT stylesheets that could allow unintended script execution. (CVE-2014-1485)\n\n - A use-after-free error exists related to image handling and 'imgRequestProxy' that could allow application crashes and possibly arbitrary code execution. (CVE-2014-1486)\n\n - An error exists related to 'web workers' that could allow cross-origin information disclosure. (CVE-2014-1487)\n\n - An error exists related to 'web workers' and 'asm.js' that could allow application crashes and possibly arbitrary code execution. (CVE-2014-1488)\n\n - Errors exist related to the included Network Security Services (NSS) libraries, 'NewSessionTicket' handshakes and public Diffie-Hellman values that could allow application crashes and possibly arbitrary code execution. (CVE-2014-1490, CVE-2014-1491)\n\nThe detected version from the remote host was :\n %L

Solution: Upgrade to SeaMonkey 2.24, or later.

CVE-2014-1491


Copyright Tenable Network Security Inc. 2014