Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Mozilla SeaMonkey < 2.0 Multiple Vulnerabilities

High

Synopsis

The remote host is running a web browser that is vulnerable to multiple attack vectors.

Description

The remote host is running a version of Mozilla SeaMonkey earlier than 2.0. Such versions are potentially affected by multiple vulnerabilities :

- A flaw exists in the parsing of regular expressions used in Proxy Auto-configuration (PAC) files. (MFSA 2009-55)

- A heap-based buffer overflow exists in Mozilla's GIF image parser. (MFSA 2009-56)

- When downloading a file containing a right-to-left override character (RTL) in the filename, the name displayed in the dialog title bar conflicts with the name of the file shown in the dialog body. (MFSA 2009-62)

Solution

Upgrade to Mozilla SeaMonkey 2.0 or later.