How to Buy
This script is Copyright (C) 2013-2016 Tenable Network Security, Inc.
The remote Windows host contains a web browser that is potentially
affected by multiple vulnerabilities.
The installed version of SeaMonkey is earlier than 2.23 and is,
therefore, potentially affected by the following vulnerabilities :
- Memory issues exist in the browser engine that could
result in a denial of service or arbitrary code
execution. (CVE-2013-5609, CVE-2013-5610)
- Cross-site scripting filtering evasion may be possible
due to character encodings being inherited from a
previously visited website when character set encoding
is missing from the current website. (CVE-2013-5612)
- Two use-after-free vulnerabilities exist in the
functions for synthetic mouse movement handling.
- Sandbox restrictions may be bypassed because 'iframe
sandbox' restrictions are not properly applied to
'object' elements in sandboxed iframes. (CVE-2013-5614)
- An issue exists in which 'GetElementIC' typed array
stubs can be generated outside observed typesets. This
could lead to unpredictable behavior with a potential
security impact. (CVE-2013-5615)
- A use-after-free vulnerability exists when
interacting with event listeners from the mListeners
array. This could result in a denial of service or
arbitrary code execution. (CVE-2013-5616)
- A use-after-free vulnerability exists in the table
editing user interface of the editor during garbage
collection. This could result in a denial of service or
arbitrary code execution. (CVE-2013-5618)
- Memory issues exist in the binary search algorithms in
a denial of service or arbitrary code execution.
- Issues exist with the JPEG format image processing with
Start Of Scan (SOS) and Define Huffman Table (DHT)
markers in the 'libjpeg' library. This could allow
attackers to read arbitrary memory content as well as
cross-domain image theft. (CVE-2013-6629, CVE-2013-6630)
- A memory issue exists when inserting an ordered list
into a document through a script that could result in a
denial of service or arbitrary code execution.
- Trust settings for built-in root certificates are
ignored during extended validation (EV) certificate
validation. This removes the ability of users to
explicitly untrust root certificates from specific
certificate authorities. (CVE-2013-6673)
- An intermediate certificate that is used by a man-in-
the-middle (MITM) traffic management device exists in
Mozilla's root certificate authorities. Reportedly,
this certificate has been misused.
See also :
Upgrade to SeaMonkey 2.23 or later.
Risk factor :
High / CVSS Base Score : 9.3
CVSS Temporal Score : 8.4
Public Exploit Available : true
Nessus Plugin ID: 71349 ()
Bugtraq ID: 63676676796420364204642056420664207642096421164212642136421564216
CVE ID: CVE-2013-5609CVE-2013-5610CVE-2013-5612CVE-2013-5613CVE-2013-5614CVE-2013-5615CVE-2013-5616CVE-2013-5618CVE-2013-5619CVE-2013-6629CVE-2013-6630CVE-2013-6671CVE-2013-6673
Upgrade to Nessus Professional today!
Start your free Nessus Cloud trial now!
Begin Free Trial
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.