This script is Copyright (C) 2014-2017 Tenable Network Security, Inc.
The remote Windows host contains a web browser that is affected by
The installed version of SeaMonkey is a version prior to 2.26.1. It
is, therefore, affected by the following vulnerabilities :
- There are multiple memory safety bugs in the browser
engine. Several of these bugs show evidence of
memory corruption, which may allow an attacker to
execute arbitrary code. (CVE-2014-1533, CVE-2014-1534)
- There are multiple use-after-free and out of bounds
read issues. These issues have the potential to be
exploited, resulting in remote code execution.
(CVE-2014-1536, CVE-2014-1537, CVE-2014-1538)
- A use-after-free error exists in the SMIL Animation
Controller when interacting with and rendering
improperly formed web content. This may result in a
potentially exploitable crash. (CVE-2014-1541)
- A use-after-free flaw exists in the event listener
manager that can be triggered by web content. This may
result in a potentially exploitable crash.
- A flaw exists in the Speex resample in Web Audio that
results in a buffer overflow when working with audio
content that exceeds the expected bounds. This flaw
results in a potentially exploitable crash.
- There exists a buffer overflow in the Gamepad API when
it is exercised with a gamepad device with
non-contiguous axes. This flaw results in a potentially
exploitable crash. (CVE-2014-1543)
See also :
Upgrade to SeaMonkey 2.26.1 or later.
Risk factor :
Critical / CVSS Base Score : 10.0
CVSS Temporal Score : 7.4
Public Exploit Available : false
Nessus Plugin ID: 77283 ()
Get Nessus Professional to scan unlimited IPs, run compliance checks & moreBuy Nessus Professional Now