SeaMonkey < 1.1.10 Multiple Vulnerabilities

This script is Copyright (C) 2008-2017 Tenable Network Security, Inc.


Synopsis :

A web browser on the remote host is affected by multiple
vulnerabilities.

Description :

The installed version of SeaMonkey is affected by various security
issues :

- A stability problem that could result in a crash during
JavaScript garbage collection (MFSA 2008-20).

- Several stability bugs leading to crashes which, in
some cases, show traces of memory corruption
(MFSA 2008-21).

- A vulnerability involving violation of the same-origin
policy could allow for cross-site scripting attacks
(MFSA 2008-22).

- JavaScript can be injected into the context of signed
JARs and executed under the context of the JAR's signer
(MFSA 2008-23).

- By taking advantage of the privilege level stored in
the pre-compiled 'fastload' file. an attacker may be
able to run arbitrary JavaScript code with chrome
privileges (MFSA 2008-24).

- Arbitrary code execution is possible in
'mozIJSSubScriptLoader.loadSubScript()' (MFSA 2008-25).

- Several function calls in the MIME handling code
use unsafe versions of string routines (MFSA 2008-26).

- An attacker can steal files from known locations on a
victim's computer via originalTarget and DOM Range
(MFSA 2008-27).

- It is possible for a malicious Java applet to bypass
the same-origin policy and create arbitrary socket
connections to other domains (MFSA 2008-28).

- An improperly encoded '.properties' file in an add-on
can result in uninitialized memory being used, which
could lead to data formerly used by other programs
being exposed to the add-on code (MFSA 2008-29).

- File URLs in directory listings are not properly HTML-
escaped when the filenames contained particular
characters (MFSA 2008-30).

- A weakness in the trust model regarding alt names on
peer-trusted certs could lead to spoofing secure
connections to any other site (MFSA 2008-31).

- URL shortcut files on Windows (for example, saved IE
favorites) could be interpreted as if they were in the
local file context when opened by SeaMonkey, although
the referenced remote content would be downloaded and
displayed (MFSA 2008-32).

- A crash in Mozilla's block reflow code could be used
by an attacker to crash the browser and run arbitrary
code on the victim's computer (MFSA 2008-33).

See also :

https://www.mozilla.org/en-US/security/advisories/mfsa2008-20/
https://www.mozilla.org/en-US/security/advisories/mfsa2008-21/
https://www.mozilla.org/en-US/security/advisories/mfsa2008-22/
https://www.mozilla.org/en-US/security/advisories/mfsa2008-23/
https://www.mozilla.org/en-US/security/advisories/mfsa2008-24/
https://www.mozilla.org/en-US/security/advisories/mfsa2008-25/
https://www.mozilla.org/en-US/security/advisories/mfsa2008-26/
https://www.mozilla.org/en-US/security/advisories/mfsa2008-27/
https://www.mozilla.org/en-US/security/advisories/mfsa2008-28/
https://www.mozilla.org/en-US/security/advisories/mfsa2008-29/
https://www.mozilla.org/en-US/security/advisories/mfsa2008-30/
https://www.mozilla.org/en-US/security/advisories/mfsa2008-31/
https://www.mozilla.org/en-US/security/advisories/mfsa2008-32/
https://www.mozilla.org/en-US/security/advisories/mfsa2008-33/

Solution :

Upgrade to SeaMonkey 1.1.10 or later.

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 8.1
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : true

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now