VID |
28794 |
Severity |
40 |
Port |
139,445 |
Protocol |
TCP |
Class |
SMB |
Detailed Description |
A version of Mozilla SeaMonkey which is older than 2.0 has been installed on the host. SeaMonkey is an open-source based Web browser, developed by the Mozilla project. Mozilla SeaMonkey versions prior to 2.0 are vulnerable to multiple vulnerabilities.
- Provided the browser is configured to use Proxy Auto-configuration it may be possible for an attacker to crash the browser or execute arbitrary code. (MFSA 2009-55)
- Mozilla's GIF image parser is affected by a heap-based buffer overflow. (MFSA 2009-56)
- If a file contains right-to-left override character (RTL) in the filename it may be possible for an attacker to obfuscate the filename and extension of the file being downloaded. (MFSA 2009-62)
* Note: This check requires an account with Guest or upper privileges which can access the registry of the remote host to scan. Absence of these condition will result in the check not being performed and a False Negative for all vulnerable hosts.
* References: http://www.mozilla.org/security/announce/2009/mfsa2009-55.html http://www.mozilla.org/security/announce/2009/mfsa2009-56.html http://www.mozilla.org/security/announce/2009/mfsa2009-62.html
* Platforms Affected: Mozilla Foundation, SeaMonkey versions prior to 2.0 Any operating system Any version |
Recommendation |
Upgrade to the latest version of SeaMonkey (2.0 or later), available from the Mozilla SeaMonkey Project Web page at http://www.mozilla.org/projects/seamonkey/ |
Related URL |
(CVE) |
Related URL |
(SecurityFocus) |
Related URL |
(ISS) |
|