Mozilla SeaMonkey < 2.0.4 Multiple Vulnerabilities
High Log Correlation Engine Plugin ID 801278
The remote host has a web browser installed that is vulnerable to multiple attack vectors.
The remote host is running a version of Mozilla SeaMonkey earlier than 2.0.4. Such versions are potentially affected by multiple security issues : - Multiple crashes can result in arbitrary code execution. (MFSA 2010-16) - A select event handler for XUL tree items can be called after the item is deleted. (MFSA 2010-17) - An error exists in the way '<option>' elements are inserted into a XUL tree '<optgroup>'. (MFSA 2010-18) - An error exists in the implementation of the 'windows.navigator.plugins' object. (MFSA 2010-19) - A browser applet can be used to turn a simple mouse click into a drag-and-drop action, potentially resulting in the unintended loading of resources in a user's browser. (MFSA 2010-20) Session renegotiations are not handled properly, which can be exploited to insert arbitrary plaintext by a man-in-the-middle. (MFSA 2010-22) - When an image points to a resource that redirects to a 'mailto: ' URL, the external mail handler application is launched. (MFSA 2010-23) - XML documents fail to call certain security checks when loading new content. (MFSA 2010-24) IAVA Reference : 2011-A-0107 IAVB Reference : 2012-B-0038 STIG Finding Severity : Category I