SeaMonkey < 2.7.2 'png_decompress_chunk' Integer Overflow

High Nessus Plugin ID 58009

Synopsis

The remote Windows host contains a web browser that is affected by an integer overflow vulnerability.

Description

The installed version of SeaMonkey is earlier than 2.7.2. Such versions are potentially affected by an integer overflow vulnerability.

An integer overflow error exists in 'libpng', a library used by this application. When decompressing certain PNG image files, this error can allow a heap-based buffer overflow which can crash the application or potentially allow code execution.

Solution

Upgrade to SeaMonkey 2.7.2 or later.

See Also

https://www.mozilla.org/en-US/security/advisories/mfsa2012-11/

http://www.nessus.org/u?6846f277

Plugin Details

Severity: High

ID: 58009

File Name: seamonkey_272.nasl

Version: $Revision: 1.6 $

Type: local

Family: Windows

Published: 2012/02/17

Modified: 2017/06/12

Dependencies: 20862

Risk Information

Risk Factor: High

CVSSv2

Base Score: 9.3

Temporal Score: 8.1

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:ND/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:mozilla:seamonkey

Required KB Items: SeaMonkey/Version

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2012/02/16

Vulnerability Publication Date: 2012/02/16

Reference Information

CVE: CVE-2011-3026

BID: 52049

OSVDB: 79294