SeaMonkey 2.0.x < 2.0.13 Invalid HTTP Certificates

Medium Nessus Network Monitor Plugin ID 5844

Synopsis

The remote host has a web browser installed that is vulnerable to multiple attack vectors.

Description

Versions of SeaMonkey earlier than 2.0.13 have an out-of-date SSL certificate blacklist. A certificate authority (CA) has revoked a number of fraudulent SSL certificates for several prominent public websites.

If an attacker can trick someone into using the affected browser and visiting a malicious site using one of the fraudulent certificates, he may be able to fool that user into believing the site is a legitimate one. In turn, the user could send credentials to the malicious site or download and install applications.

Solution

Upgrade to SeaMonkey 2.0.13 or later.

See Also

http://www.mozilla.org/security/known-vulnerabilities/seamonkey20.html#seamonkey2.0.13

http://www.mozilla.org/security/announce/2011/mfsa2011-11.html

Plugin Details

Severity: Medium

ID: 5844

File Name: 5844.prm

Family: Web Clients

Published: 2011/03/25

Modified: 2016/12/06

Dependencies: 3538

Nessus ID: 52769

Risk Information

Risk Factor: Medium

Vulnerability Information

CPE: cpe:/a:mozilla:seamonkey

Patch Publication Date: 2011/03/22

Vulnerability Publication Date: 2011/03/22