SeaMonkey 2.x < 2.7.2 'png_decompress_chunk' Integer Overflow

High Nessus Network Monitor Plugin ID 6329

Synopsis

The remote host has a web browser installed that is affected by an integer overflow vulnerability.

Description

Versions of SeaMonkey 2.x earlier than 2.7.2 are potentially affected by an integer overflow vulnerability in 'libpng', a library used by this application. When decompressing certain PNG image files, this error can allow a heap-based buffer overflow which can crash the application or potentially allow code execution.

Solution

Upgrade to SeaMonkey 2.7.2 or later.

See Also

http://www.mozilla.org/security/known-vulnerabilities/seamonkey.html#seamonkey2.7.2

http://www.mozilla.org/security/announce/2012/mfsa2012-11.html

Plugin Details

Severity: High

ID: 6329

File Name: 6329.prm

Family: Web Clients

Published: 2012/02/20

Modified: 2016/12/06

Dependencies: 3538

Nessus ID: 58009

Risk Information

Risk Factor: High

CVSSv2

Base Score: 9.3

Temporal Score: 6.9

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:U/RL:OF/RC:ND

CVSSv3

Base Score: 8.1

Temporal Score: 7.1

Vector: CVSS3#AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS3#E:U/RL:O/RC:X

Vulnerability Information

CPE: cpe:/a:mozilla:seamonkey

Patch Publication Date: 2012/02/16

Vulnerability Publication Date: 2012/02/16

Reference Information

CVE: CVE-2011-3026

BID: 52049