SeaMonkey < 2.0 Multiple Vulnerabilities

Medium Nessus Network Monitor Plugin ID 5219

Synopsis

The remote host is running a web browser that is vulnerable to multiple attack vectors.

Description

The remote host is running a version of SeaMonkey earlier than 2.0. Such versions are potentially affected by multiple vulnerabilities :

- A flaw exists in the parsing of regular expressions used in Proxy Auto-configuration (PAC) files. (MFSA 2009-55)

- A heap-based buffer overflow exists in Mozilla's GIF image parser. (MFSA 2009-56)

- When downloading a file containing a right-to-left override character (RTL) in the filename, the name displayed in the dialog title bar conflicts with the name of the file shown in the dialog body. (MFSA 2009-62)

Solution

Upgrade to SeaMonkey 2.0 or later.

See Also

http://www.mozilla.org/security/announce/2009/mfsa2009-55.html

http://www.mozilla.org/security/announce/2009/mfsa2009-56.html

http://www.mozilla.org/security/announce/2009/mfsa2009-62.html

http://www.mozilla.org/security/known-vulnerabilities/seamonkey11.html

Plugin Details

Severity: Medium

ID: 5219

File Name: 5219.prm

Family: Web Clients

Published: 2009/10/28

Modified: 2016/12/06

Dependencies: 3538

Nessus ID: 42307

Risk Information

Risk Factor: Medium

CVSSv2

Base Score: 6.8

Temporal Score: 5.6

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:F/RL:OF/RC:C

CVSSv3

Base Score: 5.6

Temporal Score: 5.2

Vector: CVSS3#AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L

Temporal Vector: CVSS3#E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:mozilla:seamonkey

Patch Publication Date: 2009/10/27

Vulnerability Publication Date: 2009/10/28

Reference Information

CVE: CVE-2009-3372, CVE-2009-3373, CVE-2009-3376

BID: 36855, 36856, 36867