SeaMonkey < 2.21 Multiple Vulnerabilities

critical Nessus Plugin ID 69996


The remote Windows host contains a web browser that is potentially affected by multiple vulnerabilities.


The installed version of SeaMonkey is earlier than 2.21 and thus, is potentially affected by the following vulnerabilities :

- Memory issues exist in the browser engine that could allow for denial of service or arbitrary code execution.
(CVE-2013-1718, CVE-2013-1719)

- The HTML5 Tree Builder does not properly maintain states, which could result in a denial of service or possible arbitrary code execution. (CVE-2013-1720)

- The ANGLE library is vulnerable to an integer overflow, which could result in a denial of service or arbitrary code execution. (CVE-2013-1721)

- Multiple use-after-free problems exist, which could result in denial of service attacks or arbitrary code execution. (CVE-2013-1722, CVE-2013-1724, CVE-2013-1735, CVE-2013-1736, CVE-2013-1738)

- The NativeKey widget does not properly terminate key messages, possibly leading to a denial of service attack. (CVE-2013-1723)

- Incorrect scope handling for JavaScript objects with compartments could result in denial of service or possibly arbitrary code execution. (CVE-2013-1725)

- Local users can gain the same privileges as the Mozilla Updater because the application does not ensure exclusive access to the update file. An attacker could exploit this by inserting a malicious file into the update file. (CVE-2013-1726)

- Sensitive information can be obtained via unspecified vectors because the IonMonkey JavaScript does not properly initialize memory. (CVE-2013-1728)

- A JavaScript compartment mismatch could result in a denial of service or arbitrary code execution. Versions of Firefox 20 or greater are not susceptible to the arbitrary code execution mentioned above.

- A buffer overflow is possible because of an issue with multi-column layouts. (CVE-2013-1732)

- An object is not properly identified during use of user-defined getter methods on DOM proxies. This could result in access restrictions being bypassed.


Upgrade to SeaMonkey 2.21 or later.

See Also

Plugin Details

Severity: Critical

ID: 69996

File Name: seamonkey_221.nasl

Version: 1.10

Type: local

Agent: windows

Family: Windows

Published: 9/19/2013

Updated: 11/27/2019

Supported Sensors: Nessus Agent

Risk Information


Risk Factor: Medium

Score: 6.7


Risk Factor: Critical

Base Score: 10

Temporal Score: 8.7

Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: E:H/RL:OF/RC:C

CVSS Score Source: CVE-2013-1736

Vulnerability Information

CPE: cpe:/a:mozilla:seamonkey

Required KB Items: SeaMonkey/Version

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 9/17/2013

Vulnerability Publication Date: 9/17/2013

Reference Information

CVE: CVE-2013-1718, CVE-2013-1719, CVE-2013-1720, CVE-2013-1721, CVE-2013-1722, CVE-2013-1723, CVE-2013-1724, CVE-2013-1725, CVE-2013-1726, CVE-2013-1728, CVE-2013-1730, CVE-2013-1732, CVE-2013-1735, CVE-2013-1736, CVE-2013-1737, CVE-2013-1738

BID: 62460, 62462, 62463, 62464, 62465, 62466, 62467, 62468, 62469, 62470, 62472, 62473, 62475, 62478, 62479, 62482