SeaMonkey < 1.1.12 Multiple Vulnerabilities

medium Nessus Network Monitor Plugin ID 4693

Synopsis

A web browser on the remote host is affected by multiple vulnerabilities.

Description

The installed version of SeaMonkey is affected by various security issues :

- Using a specially crafted UTF-8 URL in a hyperlink, an attacker might be able to exploit a stack buffer overflow in the Mozilla URL parsing routes to execute arbitrary code (MFSA 2008-37).
- It is possible to bypass the same-origin check in 'nsXMLDocument: : OnChannelRedirect()' (MFSA 2008-38).
- An attacker can cause the content window to move while the mouse is being clicked, causing an item to be dragged rather than clicked-on (MFSA 2008-40).
- Privilege escalation is possible via 'XPCnativeWrapper' pollution (MFSA 2008-41).
- There are several stability bugs in the browser engine that may lead to crashes with evidence of memory corruption (MFSA 2008-42).
- Certain BOM characters and low surrogate characters, if HTML-escaped, are stripped from JavaScript code before it is executed, which could allow for cross-site scripting attacks (MFSA 2008-43).
- The 'resource: ' protocol allows directory traversal on Linux when using URL-encoded slashes, and it can by used to bypass restrictions on local HTML files (MFSA 2008-44).
- A bug in the XBM decoder allows random small chunks of uninitialized memory to be read (MFSA 2008-45).

Solution

Upgrade to version 1.1.12 or higher.

See Also

http://www.mozilla.org/security/announce/2008/mfsa2008-40.html

http://www.mozilla.org/security/announce/2008/mfsa2008-41.html

http://www.mozilla.org/security/announce/2008/mfsa2008-42.html

http://www.mozilla.org/security/announce/2008/mfsa2008-43.html

http://www.mozilla.org/security/announce/2008/mfsa2008-44.html

http://www.mozilla.org/security/announce/2008/mfsa2008-38.html

http://www.mozilla.org/security/announce/2008/mfsa2008-45.html

http://www.mozilla.org/security/announce/2008/mfsa2008-37.html

http://www.mozilla.org/security/announce/2008/mfsa2008-46.html

Plugin Details

Severity: Medium

ID: 4693

Family: Web Clients

Published: 9/24/2008

Updated: 3/6/2019

Nessus ID: 34269

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5.6

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

CVSS v3

Risk Factor: Medium

Base Score: 5.6

Temporal Score: 5.2

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:mozilla:seamonkey

Exploitable With

CANVAS (CANVAS)

Core Impact

Reference Information

CVE: CVE-2008-0016, CVE-2008-3835, CVE-2008-3836, CVE-2008-3837, CVE-2008-4058, CVE-2008-4059, CVE-2008-4060, CVE-2008-4061, CVE-2008-4062, CVE-2008-4063, CVE-2008-4064, CVE-2008-4065, CVE-2008-4066, CVE-2008-4067, CVE-2008-4068, CVE-2008-4069, CVE-2008-4070

BID: 31346, 31411, 31397