SeaMonkey < 2.29.1 NSS Signature Verification Vulnerability

This script is Copyright (C) 2014-2017 Tenable Network Security, Inc.

Synopsis :

The remote Windows host contains a web browser that is affected by a
signature forgery vulnerability.

Description :

The version of SeaMonkey installed on the remote host is prior to
2.29.1. It is, therefore, affected by a flaw in the Network Security
Services (NSS) library, which is due to lenient parsing of ASN.1
values involved in a signature and can lead to the forgery of RSA
signatures, such as SSL certificates.

See also :

Solution :

Upgrade to SeaMonkey 2.29.1 or later.

Risk factor :

High / CVSS Base Score : 8.8
CVSS Temporal Score : 7.3
Public Exploit Available : true

Family: Windows

Nessus Plugin ID: 77909 ()

Bugtraq ID: 70116

CVE ID: CVE-2014-1568

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now