This script is Copyright (C) 2007-2010 Tenable Network Security, Inc.
The remote SuSE system is missing the security patch seamonkey-3631
This update brings Mozilla Seamonkey to security update
- MFSA 2007-17 / CVE-2007-2871:
Chris Thomas demonstrated that XUL popups opened by web
content could be placed outside the boundaries of the
content area. This could be used to spoof or hide parts of
the browser chrome such as the location bar.
- MFSA 2007-16 / CVE-2007-2870:
Mozilla contributor moz_bug_r_a4 demonstrated that the
addEventListener method could be used to inject script into
another site in violation of the browser's same-origin
policy. This could be used to access or modify private or
valuable information from that other site.
- MFSA 2007-15 / CVE-2007-1558:
Gaï¿½tan Leurent informed us of a weakness in APOP
authentication that could allow an attacker to recover the
first part of your mail password if the attacker could
interpose a malicious mail server on your network
masquerading as your legitimate mail server. With normal
settings it could take several hours for the attacker to
gather enough data to recover just a few characters of the
password. This result was presented at the Fast Software
Encryption 2007 conference.
- MFSA 2007-14 / CVE-2007-1362:
Nicolas Derouet reported two problems with cookie
handling in Mozilla clients. Insufficient length checks
could be use to exhaust browser memory and so to crash the
browser or at least slow it done by a large degree.
The second issue was that the cookie path and name values
were not checked for the presence of the delimiter used for
internal cookie storage, and if present this confused
future interpretation of the cookie data. This is not
considered to be exploitable.
- MFSA 2007-13 / CVE-2007-2869:
Marcel reported that a malicious web page could perform a
denial of service attack against the form autocomplete
feature that would persist from session to session until
the malicious form data was deleted. Filling a text field
with millions of characters and submitting the form will
cause the victim's browser to hang for up to several
minutes while the form data is read, and this will happen
the first time autocomplete is triggered after every
No harm is done to the user's computer, but the
frustration caused by the hang could prevent use of
Thunderbird if users don't know how to clear the bad state.
- MFSA 2007-12 / CVE-2007-2867 / CVE-2007-2868
As part of the Thunderbird 18.104.22.168 and 22.214.171.124 update
releases Mozilla developers fixed many bugs to improve the
stability of the product. Some of these crashes that showed
evidence of memory corruption under certain circumstances
and we presume that with enough effort at least some of
these could be exploited to run arbitrary code.
Without further investigation we cannot rule out the
possibility that for some of these an attacker might be
able to prepare memory for exploitation through some means
- MFSA 2007-11 / CVE-2007-1562:
Incorrect FTP PASV handling could be used by malicious
ftp servers to do a rudimentary port scanning of for
instance internal networks of the computer the browser is
Install the seamonkey-3631 security patch by using 'yast', for example.
Risk factor :
High / CVSS Base Score : 9.3