SeaMonkey < 2.26 Multiple Vulnerabilities

High Nessus Network Monitor Plugin ID 8214

Synopsis

The remote host has a web browser installed that is vulnerable to multiple attack vectors.

Description

Versions of SeaMonkey earlier than 2.26 are unpatched against the following vulnerabilities:

- Use-after-free vulnerabilities in nsHostResolver, imgLoader, and Text Track Manager (for HTML video), which can crash with a potentially exploitable condition (CVE-2014-1532, CVE-2014-1531, CVE-2014-1525)

- A potentially exploitable out-of-bounds write in Cairo, a potentially exploitable out-of-bounds read issue with Web Audio, and a non-exploitable out-of-bounds read when decoding JPG images (CVE-2014-1528, CVE-2014-1522, CVE-2014-1523)

- Improper wildcard matching of domains in the Network Security Services (NSS library), which has since been fixed by updating to version 3.16 (CVE-2014-1492)

- Potential privilege escalation via Xray Wrappers bypass, which can occur if a user used the debugger to interact with a malicious page (CVE-2014-1526)

- Privilege escalation for scripts when sites that have been granted notification permissions by a user can bypass security checks on source components for the Web Notification API (CVE-2014-1529)

- A potentially exploitable buffer overflow when a script uses a non-XBL object as an XBL object (CVE-2014-1524)

- A cross-site scripting vulnerability using browser navigations through history to load a website with the page's base URI pointing to a different site (CVE-2014-1530)

- Various memory safety hazards (CVE-2014-1518, CVE-2014-1519)

Solution

Upgrade to SeaMonkey 2.26, or later.

See Also

http://www.mozilla.org/security/announce/2014/mfsa2014-47.html

http://www.mozilla.org/security/announce/2014/mfsa2014-46.html

http://www.mozilla.org/security/announce/2014/mfsa2014-45.html

http://www.mozilla.org/security/announce/2014/mfsa2014-44.html

http://www.mozilla.org/security/announce/2014/mfsa2014-43.html

http://www.mozilla.org/security/announce/2014/mfsa2014-42.html

http://www.mozilla.org/security/announce/2014/mfsa2014-41.html

http://www.mozilla.org/security/announce/2014/mfsa2014-40.html

http://www.mozilla.org/security/announce/2014/mfsa2014-39.html

http://www.mozilla.org/security/announce/2014/mfsa2014-38.html

http://www.mozilla.org/security/announce/2014/mfsa2014-37.html

http://www.mozilla.org/security/announce/2014/mfsa2014-36.html

http://www.mozilla.org/security/announce/2014/mfsa2014-35.html

http://www.mozilla.org/security/announce/2014/mfsa2014-34.html

http://www.mozilla.org/security/announce/2014/mfsa2014-37.html

Plugin Details

Severity: High

ID: 8214

File Name: 8214.prm

Family: Web Clients

Published: 2014/05/05

Modified: 2016/12/06

Dependencies: 3538

Nessus ID: 73771

Risk Information

Risk Factor: High

CVSSv2

Base Score: 9.3

Temporal Score: 8.1

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:ND/RL:OF/RC:C

CVSSv3

Base Score: 8.1

Temporal Score: 7.7

Vector: CVSS3#AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS3#E:X/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:mozilla:seamonkey

Patch Publication Date: 2014/04/29

Vulnerability Publication Date: 2014/04/29

Reference Information

CVE: CVE-2014-1492, CVE-2014-1526, CVE-2014-1532, CVE-2014-1531, CVE-2014-1530, CVE-2014-1529, CVE-2014-1528, CVE-2014-1525, CVE-2014-1524, CVE-2014-1523, CVE-2014-1522, CVE-2014-1518, CVE-2014-1519

BID: 66356, 67123, 67125, 67127, 67129, 67130, 67131, 67132, 67133, 67134, 67135, 67136, 67137