Korean
<< Back
VID 28870
Severity 40
Port 139,445
Protocol TCP
Class SMB
Detailed Description A version of Mozilla SeaMonkey which is older than 2.15.0 has been installed on the host. SeaMonkey is an open-source based Web browser, developed by the Mozilla project. Mozilla SeaMonkey versions prior to 2.15.0 are vulnerable to multiple vulnerabilities

- Multiple, unspecified use-after-free, out-of-bounds read and buffer overflow errors exist. (CVE-2012-5829, CVE-2013-0760, CVE-2013-0761, CVE-2013-0762, CVE-2013-0763, CVE-2013-0766, CVE-2013-0767, CVE-2013-0771)

- Two intermediate certificates were improperly issued by TURKTRUST certificate authority. (CVE-2013-0743)

- A use-after-free error exists related to displaying HTML tables with many columns and column groups. (CVE-2013-0744)

- An error exists related to the 'AutoWrapperChanger' class that does not properly manage objects during garbage collection. (CVE-2012-0745)

- An error exists related to 'jsval', 'quickstubs', and compartmental mismatches that can lead potentially exploitable crashes. (CVE-2013-0746)

- Errors exist related to events in the plugin handler that can allow same-origin policy bypass. (CVE-2013-0747)

- An error related to the 'toString' method of XBL objects can lead to address information leakage. (CVE-2013-0748)

- An unspecified memory corruption issue exists. (CVE-2013-0749, CVE-2013-0769, CVE-2013-0770)

- A buffer overflow exists related to JavaScript string concatenation. (CVE-2013-0750)

- An error exists related to multiple XML bindings with SVG content, contained in XBL files. (CVE-2013-0752)

- A use-after-free error exists related to 'XMLSerializer' and 'serializeToStream'. (CVE-2013-0753)

- A use-after-free error exists related to garbage collection and 'ListenManager'. (CVE-2013-0754)

- A use-after-free error exists related to the 'Vibrate' library and 'domDoc'. (CVE-2013-0755)

- A use-after-free error exists related to JavaScript 'Proxy' objects. (CVE-2013-0756)

- 'Chrome Object Wrappers' (COW) can be bypassed by changing object prototypes and can allow arbitrary code execution. (CVE-2013-0757)

- An error related to SVG elements and plugins can allow privilege escalation. (CVE-2013-0758)

- An error exists related to the address bar that can allow URL spoofing attacks. (CVE-2013-0759)

- An error exists related to SSL and threading that can result in potentially exploitable crashes. (CVE-2013-0764)

- An error exists related to 'Canvas' and bad height or width values passed to it from HTML. (CVE-2013-0768)

* Note: This check requires an account with Guest or upper privileges which can access the registry of the remote host to scan. Absence of this condition will result in the check not being performed and a False Negative for all vulnerable hosts.

* References:
http://www.zerodayinitiative.com/advisories/ZDI-13-003/
http://www.zerodayinitiative.com/advisories/ZDI-13-006/
http://www.zerodayinitiative.com/advisories/ZDI-13-037/
http://www.zerodayinitiative.com/advisories/ZDI-13-038/
http://www.zerodayinitiative.com/advisories/ZDI-13-039/

* Platforms Affected:
Mozilla Foundation, SeaMonkey versions prior to 2.15.0
Any operating system Any version
Recommendation Upgrade to the latest version of SeaMonkey (2.15.0 or later), available from the Mozilla SeaMonkey Project Web page at http://www.mozilla.org/projects/seamonkey/
Related URL CVE-2013-0744,CVE-2013-0745,CVE-2013-0746,CVE-2013-0747,CVE-2013-0748,CVE-2013-0749,CVE-2013-0750,CVE-2013-0752,CVE-2013-0753,CVE-2013-0754 (CVE)
Related URL 57193,57194,57195,57196,57197,57198,57199,57203,57204,57205,57207,57209 (SecurityFocus)
Related URL (ISS)