Mozilla SeaMonkey < 2.0 Multiple Vulnerabilities

high Log Correlation Engine Plugin ID 801372
New! Plugin Severity Now Using CVSS v3

The calculated severity for Plugins has been updated to use CVSS v3 by default. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Synopsis

The remote host is running a web browser that is vulnerable to multiple attack vectors.

Description

The remote host is running a version of Mozilla SeaMonkey earlier than 2.0. Such versions are potentially affected by multiple vulnerabilities :

- A flaw exists in the parsing of regular expressions used in Proxy Auto-configuration (PAC) files. (MFSA 2009-55)

- A heap-based buffer overflow exists in Mozilla's GIF image parser. (MFSA 2009-56)

- When downloading a file containing a right-to-left override character (RTL) in the filename, the name displayed in the dialog title bar conflicts with the name of the file shown in the dialog body. (MFSA 2009-62)

Solution

Upgrade to Mozilla SeaMonkey 2.0 or later.

See Also

http://.mozilla.org/security/announce/2009/mfsa2009-55.html

http://.mozilla.org/security/announce/2009/mfsa2009-56.html

http://.mozilla.org/security/announce/2009/mfsa2009-62.html

http://.mozilla.org/security/known-vulnerabilities/seamonkey11.html

Plugin Details

Severity: High

ID: 801372

Family: Web Clients

Published: 10/28/2009

Updated: 10/28/2009

Nessus ID: 42307

Risk Information

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5.6

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:F/RL:OF/RC:C

Vulnerability Information

Patch Publication Date: 10/27/2009

Vulnerability Publication Date: 10/28/2009

Reference Information

CVE: CVE-2009-3376, CVE-2009-3372, CVE-2009-3373

BID: 36867, 36855, 36856