Mozilla SeaMonkey 2.x < 2.12 Multiple Vulnerabilities

High Log Correlation Engine Plugin ID 801356

Synopsis

The remote host has a web browser installed that is vulnerable to multiple vulnerabilities.

Description

Versions of SeaMonkey 2.x earlier than 2.12 are potentially affected by the following security issues :

- An error exists related to 'Object.defineProperty' and the location object that could allow cross-site scripting attacks. (CVE-2012-1956)

- Unspecified memory safety issues exist. (CVE-2012-1970, CVE-2012-1971)

- Multiple use-after-free errors exist. (CVE-2012-1972, CVE-2012-1973, CVE-2012-1974, CVE-2012-1975, CVE-2012-1976, CVE-2012-3956, CVE-2012-3957, CVE-2012-3958, CVE-2012-3959, CVE-2012-3960, CVE-2012-3961, CVE-2012-3962, CVE-2012-3963, CVE-2012-3964)

- An error exists related to bitmap (BMP) and icon (ICO) file decoding that can lead to memory corruption, causing application crashes and potentially arbitrary code execution. (CVE-2012-3966)

- A use-after-free error exists related to WebGL shaders. (CVE-2012-3968)

- A buffer overflow exists related to SVG filters. (CVE-2012-3969)

- A use-after-free error exists related to elements having 'requiredFeatures' attributes. (CVE-2012-3970)

- A 'Graphite 2' library memory corruption error exists. (CVE-2012-3971)

- An XSLT out-of-bounds read error exists related to 'format-number'. (CVE-2012-3972)

- The DOM parser can unintentionally load linked resources in extensions. (CVE-2012-3975)

- Incorrect SSL certificate information can be displayed in the address bar when two 'onLocationChange' events fire out of order. (CVE-2012-3976)

- Security checks related to location objects can be bypassed if crafted calls are made to the browser chrome code. (CVE-2012-3978)

Solution

Upgrade to SeaMonkey 2.12 or later.

See Also

http://www.mozilla.org/security/announce/2012/mfsa2012-56.html

http://www.mozilla.org/security/announce/2012/mfsa2012-57.html

http://www.mozilla.org/security/announce/2012/mfsa2012-58.html

http://www.mozilla.org/security/announce/2012/mfsa2012-59.html

http://www.mozilla.org/security/announce/2012/mfsa2012-60.html

http://www.mozilla.org/security/announce/2012/mfsa2012-61.html

http://www.mozilla.org/security/announce/2012/mfsa2012-62.html

http://www.mozilla.org/security/announce/2012/mfsa2012-63.html

http://www.mozilla.org/security/announce/2012/mfsa2012-64.html

http://www.mozilla.org/security/announce/2012/mfsa2012-65.html

http://www.mozilla.org/security/announce/2012/mfsa2012-68.html

http://www.mozilla.org/security/announce/2012/mfsa2012-69.html

http://www.mozilla.org/security/announce/2012/mfsa2012-70.html

Plugin Details

Severity: High

ID: 801356

Family: Web Clients

Published: 2012/08/30

Nessus ID: 61718

Risk Information

Risk Factor: High

CVSS v2.0

Base Score: 9.3

Temporal Score: 6.9

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

Vulnerability Information

Patch Publication Date: 2012/08/28

Vulnerability Publication Date: 2012/08/28

Reference Information

CVE: CVE-2012-1956, CVE-2012-1970, CVE-2012-1971, CVE-2012-1972, CVE-2012-1973, CVE-2012-1974, CVE-2012-1975, CVE-2012-1976, CVE-2012-3956, CVE-2012-3957, CVE-2012-3958, CVE-2012-3959, CVE-2012-3960, CVE-2012-3961, CVE-2012-3962, CVE-2012-3963, CVE-2012-3964, CVE-2012-3966, CVE-2012-3967, CVE-2012-3968, CVE-2012-3969, CVE-2012-3970, CVE-2012-3971, CVE-2012-3972, CVE-2012-3975, CVE-2012-3976, CVE-2012-3978, CVE-2012-4930

BID: 55249, 55260, 55264, 55266, 55274, 55276, 55277, 55278, 55292, 55304, 55306, 55310, 55311, 55313, 55314, 55316, 55317, 55318, 55319, 55320, 55321, 55322, 55323, 55324, 55325, 55340, 55341, 55342