SeaMonkey < 1.1.10 Multiple Vulnerabilities

High Nessus Plugin ID 33394

New! Vulnerability Priority Rating (VPR)

Tenable calculates a dynamic VPR for every vulnerability. VPR combines vulnerability information with threat intelligence and machine learning algorithms to predict which vulnerabilities are most likely to be exploited in attacks. Read more about what VPR is and how it's different from CVSS.

VPR Score: 7.4


A web browser on the remote host is affected by multiple vulnerabilities.


The installed version of SeaMonkey is affected by various security issues :

- A stability problem that could result in a crash during JavaScript garbage collection (MFSA 2008-20).

- Several stability bugs leading to crashes which, in some cases, show traces of memory corruption (MFSA 2008-21).

- A vulnerability involving violation of the same-origin policy could allow for cross-site scripting attacks (MFSA 2008-22).

- JavaScript can be injected into the context of signed JARs and executed under the context of the JAR's signer (MFSA 2008-23).

- By taking advantage of the privilege level stored in the pre-compiled 'fastload' file. an attacker may be able to run arbitrary JavaScript code with chrome privileges (MFSA 2008-24).

- Arbitrary code execution is possible in 'mozIJSSubScriptLoader.loadSubScript()' (MFSA 2008-25).

- Several function calls in the MIME handling code use unsafe versions of string routines (MFSA 2008-26).

- An attacker can steal files from known locations on a victim's computer via originalTarget and DOM Range (MFSA 2008-27).

- It is possible for a malicious Java applet to bypass the same-origin policy and create arbitrary socket connections to other domains (MFSA 2008-28).

- An improperly encoded '.properties' file in an add-on can result in uninitialized memory being used, which could lead to data formerly used by other programs being exposed to the add-on code (MFSA 2008-29).

- File URLs in directory listings are not properly HTML- escaped when the filenames contained particular characters (MFSA 2008-30).

- A weakness in the trust model regarding alt names on peer-trusted certs could lead to spoofing secure connections to any other site (MFSA 2008-31).

- URL shortcut files on Windows (for example, saved IE favorites) could be interpreted as if they were in the local file context when opened by SeaMonkey, although the referenced remote content would be downloaded and displayed (MFSA 2008-32).

- A crash in Mozilla's block reflow code could be used by an attacker to crash the browser and run arbitrary code on the victim's computer (MFSA 2008-33).


Upgrade to SeaMonkey 1.1.10 or later.

See Also

Plugin Details

Severity: High

ID: 33394

File Name: seamonkey_1110.nasl

Version: 1.17

Type: local

Agent: windows

Family: Windows

Published: 2008/07/02

Updated: 2018/07/27

Dependencies: 20862

Risk Information

Risk Factor: High

VPR Score: 7.4

CVSS v2.0

Base Score: 9.3

Temporal Score: 7.7

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:F/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:mozilla:seamonkey

Required KB Items: SeaMonkey/Version

Exploit Available: true

Exploit Ease: Exploits are available

Exploitable With


Reference Information

CVE: CVE-2008-1380, CVE-2008-2798, CVE-2008-2799, CVE-2008-2800, CVE-2008-2801, CVE-2008-2802, CVE-2008-2803, CVE-2008-2805, CVE-2008-2806, CVE-2008-2807, CVE-2008-2808, CVE-2008-2809, CVE-2008-2810, CVE-2008-2811

BID: 30038

CWE: 20, 79, 200, 264, 287, 399