Lucene search

K
nessusTenable8626.PRM
HistoryJan 16, 2015 - 12:00 a.m.

SeaMonkey < 2.32 Multiple Vulnerabilities

2015-01-1600:00:00
Tenable
www.tenable.com
8

Versions of SeaMonkey earlier than 2.32 are unpatched against the following vulnerabilities :

  • Multiple unspecified memory safety issues exist within the browser engine. (CVE-2014-8634, CVE-2014-8635)

  • A flaw exists where DOM objects with some specific properties can bypass XrayWrappers. This can allow web content to confuse privileged code, potentially enabling privilege escalation. (CVE-2014-8636)

  • A flaw exists in the rendering of bitmap images. When rending a malformed bitmap image, memory may not always be properly initialized, which can result in a leakage of data to web content. (CVE-2014-8637)

  • A flaw exists in ‘navigator.sendBeacon()’ in which it does not follow the cross-origin resource sharing specification. This results in requests from ‘sendBeacon()’ lacking an ‘origin’ header, which allows malicious sites to perform XSRF attacks. (CVE-2014-8638)

  • A flaw exists when receiving 407 Proxy Authentication responses with a ‘set-cookie’ header. This can allow a session-fixation attack. (CVE-2014-8639)

  • A flaw exists in Web Audio that cam allow a small block of memory to be read. (CVE-2014-8640)

  • A read-after-free flaw exists in WebRTC due to the way tracks are handled, which can result in a potentially exploitable crash or incorrect WebRTC behavior. (CVE-2014-8641)

  • A flaw exists where delegated Online Certificate Status Protocol responder certificates fail to recognize the id-pkix-ocsp-nocheck extension. This can result in a user connecting to a site with a revoked certificate. (CVE-2014-8642)

Binary data 8626.prm
VendorProductVersionCPE
mozillaseamonkeycpe:/a:mozilla:seamonkey

References