Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

SeaMonkey < 2.29.1 RSA Signature Forgery in NSS

High

Synopsis

The remote host has a web browser installed that is vulnerable to a critical issue via the Network Security Services (NSS) library.

Description

Versions of SeaMonkey earlier than 2.29.1 utilize a vulnerable version of the Network Security Services library for cryptographic functionality. The issue lies in the incorrect check of signature padding, leading to potential signature forgery that can be leveraged for man-in-the-middle attacks over SSL.

Solution

Upgrade to SeaMonkey 2.29.1, or later.