Korean
<< Back
VID 28794
Severity 40
Port 139,445
Protocol TCP
Class SMB
Detailed Description A version of Mozilla SeaMonkey which is older than 2.0 has been installed on the host. SeaMonkey is an open-source based Web browser, developed by the Mozilla project. Mozilla SeaMonkey versions prior to 2.0 are vulnerable to multiple vulnerabilities.

- Provided the browser is configured to use Proxy Auto-configuration it may be possible for an attacker to crash the browser or execute arbitrary code. (MFSA 2009-55)

- Mozilla's GIF image parser is affected by a heap-based buffer overflow. (MFSA 2009-56)

- If a file contains right-to-left override character (RTL) in the filename it may be possible for an attacker to obfuscate the filename and extension of the file being downloaded. (MFSA 2009-62)

* Note: This check requires an account with Guest or upper privileges which can access the registry of the remote host to scan. Absence of these condition will result in the check not being performed and a False Negative for all vulnerable hosts.

* References:
http://www.mozilla.org/security/announce/2009/mfsa2009-55.html
http://www.mozilla.org/security/announce/2009/mfsa2009-56.html
http://www.mozilla.org/security/announce/2009/mfsa2009-62.html

* Platforms Affected:
Mozilla Foundation, SeaMonkey versions prior to 2.0
Any operating system Any version
Recommendation Upgrade to the latest version of SeaMonkey (2.0 or later), available from the Mozilla SeaMonkey Project Web page at http://www.mozilla.org/projects/seamonkey/
Related URL (CVE)
Related URL (SecurityFocus)
Related URL (ISS)