SeaMonkey < 2.32 Vulnerability

high Nessus Plugin ID 80525

Synopsis

The remote Windows host contains a web browser that is affected by a signature forgery vulnerability.

Description

The version of SeaMonkey installed on the remote host is prior to 2.32. It is, therefore, affected by the following vulnerabilities :

- Multiple unspecified memory safety issues exist within the browser engine. (CVE-2014-8634, CVE-2014-8635)

- A flaw exists where DOM objects with some specific properties can bypass XrayWrappers. This can allow web content to confuse privileged code, potentially enabling privilege escalation. (CVE-2014-8636)

- A flaw exists in the rendering of bitmap images. When rending a malformed bitmap image, memory may not always be properly initialized, which can result in a leakage of data to web content. (CVE-2014-8637)

- A flaw exists in 'navigator.sendBeacon()' in which it does not follow the cross-origin resource sharing specification. This results in requests from 'sendBeacon()' lacking an 'origin' header, which allows malicious sites to perform XSRF attacks. (CVE-2014-8638)

- A flaw exists when receiving 407 Proxy Authentication responses with a 'set-cookie' header. This can allow a session-fixation attack. (CVE-2014-8639)

- A flaw exists in Web Audio that cam allow a small block of memory to be read. (CVE-2014-8640)

- A read-after-free flaw exists in WebRTC due to the way tracks are handled, which can result in a potentially exploitable crash or incorrect WebRTC behavior.
(CVE-2014-8641)

- A flaw exists where delegated Online Certificate Status Protocol responder certificates fail to recognize the id-pkix-ocsp-nocheck extension. This can result in a user connecting to a site with a revoked certificate.
(CVE-2014-8642)

Solution

Upgrade to SeaMonkey 2.32 or later.

See Also

https://www.mozilla.org/en-US/security/advisories/mfsa2015-01/

https://www.mozilla.org/en-US/security/advisories/mfsa2015-02/

https://www.mozilla.org/en-US/security/advisories/mfsa2015-03/

https://www.mozilla.org/en-US/security/advisories/mfsa2015-04/

https://www.mozilla.org/en-US/security/advisories/mfsa2015-05/

https://www.mozilla.org/en-US/security/advisories/mfsa2015-06/

https://www.mozilla.org/en-US/security/advisories/mfsa2015-08/

https://www.mozilla.org/en-US/security/advisories/mfsa2015-09/

Plugin Details

Severity: High

ID: 80525

File Name: seamonkey_2_32.nasl

Version: 1.12

Type: local

Agent: windows

Family: Windows

Published: 1/14/2015

Updated: 11/25/2019

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: High

Score: 8.3

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 6.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS Score Source: CVE-2014-8641

Vulnerability Information

CPE: cpe:/a:mozilla:seamonkey

Required KB Items: SeaMonkey/Version

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 1/13/2015

Vulnerability Publication Date: 1/13/2014

Exploitable With

Metasploit (Firefox Proxy Prototype Privileged Javascript Injection)

Reference Information

CVE: CVE-2014-8634, CVE-2014-8635, CVE-2014-8636, CVE-2014-8637, CVE-2014-8638, CVE-2014-8639, CVE-2014-8640, CVE-2014-8641, CVE-2014-8642

BID: 72041, 72042, 72044, 72045, 72046, 72047, 72048, 72049, 72050

CWE: 20, 442, 629, 711, 712, 722, 725, 74, 750, 751, 79, 800, 801, 809, 811, 864, 900, 928, 931, 990