SeaMonkey 2.0.x < 2.0.13 Invalid HTTP Certificates

medium Nessus Network Monitor Plugin ID 5844

Synopsis

The remote host has a web browser installed that is vulnerable to multiple attack vectors.

Description

Versions of SeaMonkey earlier than 2.0.13 have an out-of-date SSL certificate blacklist. A certificate authority (CA) has revoked a number of fraudulent SSL certificates for several prominent public websites.

If an attacker can trick someone into using the affected browser and visiting a malicious site using one of the fraudulent certificates, he may be able to fool that user into believing the site is a legitimate one. In turn, the user could send credentials to the malicious site or download and install applications.

Solution

Upgrade to SeaMonkey 2.0.13 or later.

See Also

http://www.mozilla.org/security/known-vulnerabilities/seamonkey20.html#seamonkey2.0.13

http://www.mozilla.org/security/announce/2011/mfsa2011-11.html

Plugin Details

Severity: Medium

ID: 5844

Family: Web Clients

Published: 3/25/2011

Updated: 12/6/2016

Nessus ID: 52769

Vulnerability Information

CPE: cpe:/a:mozilla:seamonkey

Patch Publication Date: 3/22/2011

Vulnerability Publication Date: 3/22/2011