SeaMonkey < 2.0.11 Multiple Vulnerabilities

This script is Copyright (C) 2010-2017 Tenable Network Security, Inc.


Synopsis :

The remote Windows host contains a web browser affected by multiple
vulnerabilities

Description :

The installed version of SeaMonkey is earlier than 2.0.11. Such
versions are potentially affected by multiple vulnerabilities :

- Multiple memory corruption issues could lead to
arbitrary code execution. (MFSA 2010-74)

- On the Windows platform, when 'document.write()' is
called with a very long string, a buffer overflow could
be triggered. (MFSA 2010-75)

- A privilege escalation vulnerability exists with
'window.open' and the '<isindex>' element.
(MFSA 2010-76)

- Arbitrary code execution is possible when using HTML
tags inside a XUL tree. (MFSA 2010-77)

- Downloadable fonts could expose vulnerabilities in the
underlying OS font code. (MFSA 2010-78)

- A Java security bypass vulnerability exists when
LiveConnect is loaded via a 'data:' URL meta refresh.
(MFSA 2010-79)

- A use-after-free error exists with nsDOMAttribute
MutationObserver. (MFSA 2010-80)

- An integer overflow exists in NewIdArray. (MFSA 2010-81)

- It is possible to circumvent the fix for CVE-2010-0179.
(MFSA 2010-82)

- It is possible to spoof SSL in the location bar using
the network error page. (MFSA 2010-83)

- A cross-site scripting hazard exists in multiple
character encodings. (MFSA 2010-84)

See also :

http://www.nessus.org/u?de9e67fa
https://www.mozilla.org/en-US/security/advisories/mfsa2010-74/
https://www.mozilla.org/en-US/security/advisories/mfsa2010-75/
https://www.mozilla.org/en-US/security/advisories/mfsa2010-76/
https://www.mozilla.org/en-US/security/advisories/mfsa2010-77/
https://www.mozilla.org/en-US/security/advisories/mfsa2010-78/
https://www.mozilla.org/en-US/security/advisories/mfsa2010-79/
https://www.mozilla.org/en-US/security/advisories/mfsa2010-80/
https://www.mozilla.org/en-US/security/advisories/mfsa2010-81/
https://www.mozilla.org/en-US/security/advisories/mfsa2010-82/
https://www.mozilla.org/en-US/security/advisories/mfsa2010-83/
https://www.mozilla.org/en-US/security/advisories/mfsa2010-84/
http://www.nessus.org/u?5a988b44

Solution :

Upgrade to SeaMonkey 2.0.11 or later.

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 8.1
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : true

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now