How to Buy
This script is Copyright (C) 2014-2016 Tenable Network Security, Inc.
The remote Windows host contains a web browser that is potentially
affected by multiple vulnerabilities.
The installed version of SeaMonkey is earlier than 2.24 and is,
therefore, potentially affected by the following vulnerabilities :
- Memory issues exist in the browser engine that could
result in a denial of service or arbitrary code
execution. (CVE-2014-1477, CVE-2014-1478)
- An error exists related to System Only Wrappers (SOW)
and the XML Binding Language (XBL) that could allow
XUL content to be disclosed. (CVE-2014-1479)
- An error exists related to the 'open file' dialog that
could allow users to take unintended actions.
'window' object handling that has unspecified impact.
- An error exists related to 'RasterImage' and image
decoding that could allow application crashes and
possibly arbitrary code execution. (CVE-2014-1482)
- Errors exist related to IFrames,
'document.elementFromPoint' that could allow cross-
origin information disclosure. (CVE-2014-1483)
- An error exists related to the Content Security
Policy (CSP) and XSLT stylesheets that could allow
unintended script execution. (CVE-2014-1485)
- A use-after-free error exists related to image handling
and 'imgRequestProxy' that could allow application
crashes and possibly arbitrary code execution.
- An error exists related to 'web workers' that could
allow cross-origin information disclosure.
- An error exists related to 'web workers' and 'asm.js'
that could allow application crashes and possibly
arbitrary code execution. (CVE-2014-1488)
- Network Security Services (NSS) contains a race
condition in libssl that occurs during session ticket
processing. A remote attacker can exploit this flaw
to cause a denial of service. (CVE-2014-1490)
- Network Security Services (NSS) does not properly
restrict public values in Diffie-Hellman key exchanges,
allowing a remote attacker to bypass cryptographic
protection mechanisms. (CVE-2014-1491)
See also :
Upgrade to SeaMonkey 2.24 or later.
Risk factor :
High / CVSS Base Score : 9.3
CVSS Temporal Score : 6.9
Public Exploit Available : false
Nessus Plugin ID: 72333 ()
Bugtraq ID: 65316653176532065321653226532465326653286533065331653326533465335
CVE ID: CVE-2014-1477CVE-2014-1478CVE-2014-1479CVE-2014-1480CVE-2014-1481CVE-2014-1482CVE-2014-1483CVE-2014-1485CVE-2014-1486CVE-2014-1487CVE-2014-1488CVE-2014-1490CVE-2014-1491
Get Nessus Professional to scan unlimited IPs, run compliance checks & more
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.