icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons_061

SeaMonkey < 2.0.4 Multiple Vulnerabilities

Medium

Synopsis

The remote host has a web browser installed that is vulnerable to multiple attack vectors.

Description

The remote host is running a version of SeaMonkey earlier than 2.0.4. Such versions are potentially affected by multiple security issues :

- Multiple crashes can result in arbitrary code execution. (MFSA 2010-16)

- A select event handler for XUL tree items can be called after the item is deleted. (MFSA 2010-17)

- An error exists in the way '<option>' elements are inserted into a XUL tree '<optgroup>'. (MFSA 2010-18)

- An error exists in the implementation of the 'windows.navigator.plugins' object. (MFSA 2010-19)

- A browser applet can be used to turn a simple mouse click into a drag-and-drop action, potentially resulting in the unintended loading of resources in a user's browser. (MFSA 2010-20)

Session renegotiations are not handled properly, which can be exploited to insert arbitrary plaintext by a man-in-the-middle. (MFSA 2010-22)

- When an image points to a resource that redirects to a 'mailto: ' URL, the external mail handler application is launched. (MFSA 2010-23)

- XML documents fail to call certain security checks when loading new content. (MFSA 2010-24)

Solution

Upgrade to SeaMonkey 2.0.4 or later.