SeaMonkey < 1.1.12 Multiple Vulnerabilities

High Nessus Plugin ID 34269

Synopsis

A web browser on the remote host is affected by multiple vulnerabilities.

Description

The installed version of SeaMonkey is affected by various security issues :

- Using a specially crafted UTF-8 URL in a hyperlink, an attacker might be able to exploit a stack buffer overflow in the Mozilla URL parsing routes to execute arbitrary code. (MFSA 2008-37)

- It is possible to bypass the same-origin check in 'nsXMLDocument::OnChannelRedirect()'. (MFSA 2008-38)

- An attacker can cause the content window to move while the mouse is being clicked, causing an item to be dragged rather than clicked-on. (MFSA 2008-40)

- Privilege escalation is possible via 'XPCnativeWrapper' pollution. (MFSA 2008-41)

- There are several stability bugs in the browser engine that may lead to crashes with evidence of memory corruption. (MFSA 2008-42)

- Certain BOM characters and low surrogate characters, if HTML-escaped, are stripped from JavaScript code before it is executed, which could allow for cross- site scripting attacks. (MFSA 2008-43)

- The 'resource:' protocol allows directory traversal on Linux when using URL-encoded slashes, and it can by used to bypass restrictions on local HTML files.
(MFSA 2008-44)

- A bug in the XBM decoder allows random small chunks of uninitialized memory to be read. (MFSA 2008-45)

- There is a heap-based buffer overflow that can be triggered when canceling a newsgroup message.
(MFSA 2008-46)

Solution

Upgrade to SeaMonkey 1.1.12 or later.

See Also

https://www.mozilla.org/en-US/security/advisories/mfsa2008-37/

https://www.mozilla.org/en-US/security/advisories/mfsa2008-38/

https://www.mozilla.org/en-US/security/advisories/mfsa2008-40/

https://www.mozilla.org/en-US/security/advisories/mfsa2008-41/

https://www.mozilla.org/en-US/security/advisories/mfsa2008-42/

https://www.mozilla.org/en-US/security/advisories/mfsa2008-43/

https://www.mozilla.org/en-US/security/advisories/mfsa2008-44/

https://www.mozilla.org/en-US/security/advisories/mfsa2008-45/

https://www.mozilla.org/en-US/security/advisories/mfsa2008-46/

Plugin Details

Severity: High

ID: 34269

File Name: seamonkey_1112.nasl

Version: 1.19

Type: local

Agent: windows

Family: Windows

Published: 2008/09/24

Updated: 2018/07/27

Dependencies: 20862

Risk Information

Risk Factor: High

CVSS v2.0

Base Score: 9.3

Temporal Score: 7.7

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:F/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:mozilla:seamonkey

Required KB Items: SeaMonkey/Version

Exploit Available: true

Exploit Ease: Exploits are available

Exploitable With

CANVAS (CANVAS)

Core Impact

Reference Information

CVE: CVE-2008-0016, CVE-2008-3835, CVE-2008-3837, CVE-2008-4058, CVE-2008-4059, CVE-2008-4060, CVE-2008-4061, CVE-2008-4062, CVE-2008-4063, CVE-2008-4064, CVE-2008-4065, CVE-2008-4066, CVE-2008-4067, CVE-2008-4068, CVE-2008-4069, CVE-2008-4070

BID: 31346, 31397, 31411

Secunia: 32010

CWE: 22, 79, 119, 189, 200, 264, 399