SeaMonkey < 2.0.13 Invalid HTTP Certificates

medium Nessus Plugin ID 52769

Synopsis

The remote Windows host contains a web browser with an out-of-date SSL certificate blacklist.

Description

The installed version of SeaMonkey is earlier than 2.0.13. Such versions have an out-of-date SSL certificate blacklist.

A certificate authority (CA) has revoked a number of fraudulent SSL certificates for several prominent public websites.

If an attacker can trick someone into using the affected browser and visiting a malicious site using one of the fraudulent certificates, he may be able to fool that user into believing the site is a legitimate one. In turn, the user could send credentials to the malicious site or download and install applications.

Solution

Upgrade to SeaMonkey 2.0.13 or later.

See Also

https://www.mozilla.org/en-US/security/advisories/mfsa2011-11/

http://www.nessus.org/u?a9b416a4

http://www.nessus.org/u?14606051

Plugin Details

Severity: Medium

ID: 52769

File Name: seamonkey_2013.nasl

Version: 1.6

Type: local

Agent: windows

Family: Windows

Published: 3/23/2011

Updated: 11/15/2018

Supported Sensors: Nessus Agent, Nessus

Risk Information

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: cpe:/a:mozilla:seamonkey

Required KB Items: SeaMonkey/Version

Patch Publication Date: 3/22/2011

Vulnerability Publication Date: 3/22/2011