SeaMonkey < 2.8.0 Multiple Vulnerabilities

This script is Copyright (C) 2012-2017 Tenable Network Security, Inc.

Synopsis :

The remote Windows host contains a web browser that is affected by
multiple vulnerabilities.

Description :

The installed version of SeaMonkey is earlier than 2.8.0. Such
versions are potentially affected by the following security issues :

- Multiple memory corruption issues. By tricking a user
into visiting a specially crafted page, these issues may
allow an attacker to execute arbitrary code in the
context of the affected application. (CVE-2012-0454,
CVE-2012-0457, CVE-2012-0459, CVE-2012-0461,
CVE-2012-0462, CVE-2012-0463, CVE-2012-0464)

- An HTTP Header security bypass vulnerability that can be
leveraged by attackers to bypass certain security
restrictions and conduct cross-site scripting attacks.

- A security bypass vulnerability that can be exploited by
an attacker if the victim can be tricked into setting a
new home page by dragging a specially crafted link to
the 'home' button URL, which will set the user's home
page to a 'javascript:' URL. (CVE-2012-0458)

- An information disclosure vulnerability due to an out of
bounds read in SVG filters. (CVE-2012-0456)

- A cross-site scripting vulnerability that can be
triggered by dragging and dropping 'javascript:' links
onto a frame. (CVE-2012-0455)

- 'window.fullScreen' is writeable by untrusted content,
allowing attackers to perform UI spoofing attacks.

See also :

Solution :

Upgrade to SeaMonkey 2.8.0 or later.

Risk factor :

High / CVSS Base Score : 9.3
CVSS Temporal Score : 8.1
Public Exploit Available : false

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now