SeaMonkey < 2.0 Multiple Vulnerabilities

This script is Copyright (C) 2009-2017 Tenable Network Security, Inc.

Synopsis :

A web browser on the remote host is affected by multiple

Description :

The installed version of SeaMonkey is earlier than 2.0. Such
versions are potentially affected by the following security
issues :

- Provided the browser is configured to use Proxy
Auto-configuration it may be possible for an attacker to
crash the browser or execute arbitrary code.
(MFSA 2009-55)

- Mozilla's GIF image parser is affected by a heap-based
buffer overflow. (MFSA 2009-56)

- If a file contains right-to-left override character
(RTL) in the filename it may be possible for an attacker
to obfuscate the filename and extension of the file
being downloaded. (MFSA 2009-62)

See also :

Solution :

Upgrade to SeaMonkey 2.0 or later.

Risk factor :

High / CVSS Base Score : 9.3
CVSS Temporal Score : 8.1
Public Exploit Available : true

Family: Windows

Nessus Plugin ID: 42307 ()

Bugtraq ID: 36855

CVE ID: CVE-2009-3372

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now