SeaMonkey < 1.1.15 Multiple Vulnerabilities

This script is Copyright (C) 2009-2017 Tenable Network Security, Inc.

Synopsis :

A web browser on the remote host is affected by multiple

Description :

The installed version of SeaMonkey is earlier than 1.1.15. Such
versions are potentially affected by the following security issues :

- There are several stability bugs in the browser engine
that may lead to crashes with evidence of memory
corruption. (MFSA 2009-01)

- Cookies marked HTTPOnly are readable by JavaScript via
the 'XMLHttpRequest.getResponseHeader' and
'XMLHttpRequest.getAllResponseHeaders' APIs.
(MFSA 2009-05)

- By exploiting stability bugs in the browser engine, it
might be possible for an attacker to execute arbitrary
code on the remote system under certain conditions.
(MFSA 2009-07)

- It may be possible for a website to read arbitrary XML
data from another domain by using nsIRDFService and a
cross-domain redirect. (MFSA 2009-09)

- Vulnerabilities in the PNG libraries used by Mozilla
could be exploited to execute arbitrary code on the
remote system. (MFSA 2009-10)

- A URI spoofing vulnerability exists because the
application fails to adequately handle specific
characters in IDN subdomains. (MFSA 2009-15)

See also :

Solution :

Upgrade to SeaMonkey 1.1.15 or later.

Risk factor :

High / CVSS Base Score : 9.3
CVSS Temporal Score : 8.1
Public Exploit Available : true

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now