SeaMonkey 2.x < 2.7.2 'png_decompress_chunk' Integer Overflow

high Nessus Network Monitor Plugin ID 6329


The remote host has a web browser installed that is affected by an integer overflow vulnerability.


Versions of SeaMonkey 2.x earlier than 2.7.2 are potentially affected by an integer overflow vulnerability in 'libpng', a library used by this application. When decompressing certain PNG image files, this error can allow a heap-based buffer overflow which can crash the application or potentially allow code execution.


Upgrade to SeaMonkey 2.7.2 or later.

See Also

Plugin Details

Severity: High

ID: 6329

Family: Web Clients

Published: 2/20/2012

Updated: 3/6/2019

Nessus ID: 58009

Risk Information


Risk Factor: High

Base Score: 9.3

Temporal Score: 6.9

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:U/RL:OF/RC:ND


Risk Factor: High

Base Score: 7.4

Temporal Score: 6.4

Vector: CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:X

Vulnerability Information

CPE: cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*

Patch Publication Date: 2/16/2012

Vulnerability Publication Date: 2/16/2012

Reference Information

CVE: CVE-2011-3026

BID: 52049