VID |
28762 |
Severity |
40 |
Port |
139,445 |
Protocol |
TCP |
Class |
SMB |
Detailed Description |
A version of Mozilla SeaMonkey which is older than 1.1.15 has been installed on the host. SeaMonkey is an open-source based Web browser, developed by the Mozilla project. Mozilla SeaMonkey versions prior to 1.1.15 are vulnerable to multiple vulnerabilities. An attacker who successfully exploited the most severe of these vulnerabilities could execute arbitrary code on the affected host.
- There are several stability bugs in the browser engine that may lead to crashes with evidence of memory corruption.
- Cookies marked HTTPOnly are readable by JavaScript via the 'XMLHttpRequest.getResponseHeader' and 'XMLHttpRequest.getAllResponseHeaders' APIs.
- By exploiting stability bugs in the browser engine, it might be possible for an attacker to execute arbitrary code on the remote system under certain conditions.
- It may be possible for a website to read arbitrary XML data from another domain by using nsIRDFService and a cross-domain redirect.
- Vulnerabilities in the PNG libraries used by Mozilla could be exploited to execute arbitrary code on the remote system.
- A URI spoofing vulnerability exists because the application fails to adequately handle specific characters in IDN subdomains.
* Note: This check requires an account with Guest or upper privileges which can access the registry of the remote host to scan. Absence of these condition will result in the check not being performed and a False Negative for all vulnerable hosts.
* References: http://www.mozilla.org/security/announce/2009/mfsa2009-01.html http://www.mozilla.org/security/announce/2009/mfsa2009-05.html http://www.mozilla.org/security/announce/2009/mfsa2009-07.html http://www.mozilla.org/security/announce/2009/mfsa2009-09.html http://www.mozilla.org/security/announce/2009/mfsa2009-10.html http://www.mozilla.org/security/announce/2009/mfsa2009-15.html
* Platforms Affected: Mozilla Foundation, SeaMonkey versions prior to 1.1.15 Any operating system Any version |
Recommendation |
Upgrade to the latest version of SeaMonkey (1.1.15 or later), available from the Mozilla SeaMonkey Project Web page at http://www.mozilla.org/projects/seamonkey/ |
Related URL |
CVE-2009-0040,CVE-2009-0352,CVE-2009-0353,CVE-2009-0357,CVE-2009-0652,CVE-2009-0771,CVE-2009-0772,CVE-2009-0773,CVE-2009-0774,CVE-2009-0776 (CVE) |
Related URL |
33598,33827,33837,33990 (SecurityFocus) |
Related URL |
(ISS) |
|