SeaMonkey < 2.26.1 Multiple Vulnerabilities

Critical Nessus Plugin ID 77283


The remote Windows host contains a web browser that is affected by multiple vulnerabilities.


The installed version of SeaMonkey is a version prior to 2.26.1. It is, therefore, affected by the following vulnerabilities :

- There are multiple memory safety bugs in the browser engine. Several of these bugs show evidence of memory corruption, which may allow an attacker to execute arbitrary code. (CVE-2014-1533, CVE-2014-1534)

- There are multiple use-after-free and out of bounds read issues. These issues have the potential to be exploited, resulting in remote code execution.
(CVE-2014-1536, CVE-2014-1537, CVE-2014-1538)

- A use-after-free error exists in the SMIL Animation Controller when interacting with and rendering improperly formed web content. This may result in a potentially exploitable crash. (CVE-2014-1541)

- A use-after-free flaw exists in the event listener manager that can be triggered by web content. This may result in a potentially exploitable crash.

- A flaw exists in the Speex resample in Web Audio that results in a buffer overflow when working with audio content that exceeds the expected bounds. This flaw results in a potentially exploitable crash.

- There exists a buffer overflow in the Gamepad API when it is exercised with a gamepad device with non-contiguous axes. This flaw results in a potentially exploitable crash. (CVE-2014-1543)


Upgrade to SeaMonkey 2.26.1 or later.

See Also

Plugin Details

Severity: Critical

ID: 77283

File Name: seamonkey_2_26_1.nasl

Version: $Revision: 1.4 $

Type: local

Agent: windows

Family: Windows

Published: 2014/08/20

Modified: 2017/12/28

Dependencies: 20862

Risk Information

Risk Factor: Critical


Base Score: 10

Temporal Score: 8.3

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:F/RL:OF/RC:ND

Vulnerability Information

CPE: cpe:/a:mozilla:seamonkey

Required KB Items: SeaMonkey/Version

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2014/06/10

Vulnerability Publication Date: 2014/06/10

Reference Information

CVE: CVE-2014-1533, CVE-2014-1534, CVE-2014-1536, CVE-2014-1537, CVE-2014-1538, CVE-2014-1540, CVE-2014-1541, CVE-2014-1542, CVE-2014-1543

BID: 67969, 67968, 67979, 67978, 67966, 67971, 67976, 67965, 67964

OSVDB: 107907, 107909, 107910, 107911, 109409, 109413, 109414, 109415, 109416, 109417, 109419, 109420, 109421, 109422, 109423, 109425, 109426, 109427, 109429, 109430, 109431, 109432, 109433, 109434, 109435