SeaMonkey < 2.0.9 Multiple Vulnerabilities including memory safety bugs, buffer overflow, use-after-free error, and SSL vulnerabilitie
Reporter | Title | Published | Views | Family All 199 |
---|---|---|---|---|
Tenable Nessus | Firefox < 3.5.14 Multiple Vulnerabilities | 21 Oct 201000:00 | – | nessus |
Tenable Nessus | Mozilla Thunderbird < 3.0.9 Multiple Vulnerabilities | 21 Oct 201000:00 | – | nessus |
Tenable Nessus | Firefox 3.6 < 3.6.11 Multiple Vulnerabilities | 21 Oct 201000:00 | – | nessus |
Tenable Nessus | Mozilla Thunderbird 3.1 < 3.1.5 Multiple Vulnerabilities | 21 Oct 201000:00 | – | nessus |
Tenable Nessus | FreeBSD : mozilla -- multiple vulnerabilities (c4f067b9-dc4a-11df-8e32-000f20797ede) | 21 Oct 201000:00 | – | nessus |
Tenable Nessus | Mandriva Linux Security Advisory : firefox (MDVSA-2010:210) | 24 Oct 201000:00 | – | nessus |
Tenable Nessus | RHEL 4 / 5 : firefox (RHSA-2010:0782) | 20 Oct 201000:00 | – | nessus |
Tenable Nessus | Oracle Linux 5 : firefox (ELSA-2010-0782) | 12 Jul 201300:00 | – | nessus |
Tenable Nessus | Scientific Linux Security Update : firefox on SL4.x, SL5.x i386/x86_64 | 1 Aug 201200:00 | – | nessus |
Tenable Nessus | CentOS 4 / 5 : firefox (CESA-2010:0782) | 24 Nov 201000:00 | – | nessus |
#
# (C) Tenable Network Security, Inc.
#
include("compat.inc");
if (description)
{
script_id(50088);
script_version("1.13");
script_cvs_date("Date: 2018/11/15 20:50:28");
script_cve_id(
"CVE-2010-3170",
"CVE-2010-3173",
"CVE-2010-3174",
"CVE-2010-3176",
"CVE-2010-3177",
"CVE-2010-3178",
"CVE-2010-3179",
"CVE-2010-3180",
"CVE-2010-3181",
"CVE-2010-3183"
);
script_bugtraq_id(
42817,
44243,
44246,
44247,
44248,
44249,
44250,
44252,
44253
);
script_xref(name:"Secunia", value:"41923");
script_name(english:"SeaMonkey < 2.0.9 Multiple Vulnerabilities");
script_summary(english:"Checks version of SeaMonkey");
script_set_attribute(attribute:"synopsis",value:
"The remote Windows host contains a web browser that is affected by
multiple vulnerabilities."
);
script_set_attribute(attribute:"description",value:
"The installed version of SeaMonkey is earlier than 2.0.9. Such
versions are potentially affected by the following security issues :
- Multiple memory safety bugs could lead to memory
corruption, potentially resulting in arbitrary
code execution. (MFSA 2010-64)
- By passing an excessively long string to
'document.write', it may be possible to trigger a buffer
overflow condition resulting in arbitrary code execution
on the remote system. (MFSA 2010-65)
- A use-after-free error in nsBarProp could allow
arbitrary code execution on the remote system.
(MFSA 2010-66)
- A dangling pointer vulnerability in LookupGetterOrSetter
could allow arbitrary code execution. (MFSA 2010-67)
- The Gopher parser is affected by a cross-site scripting
vulnerability. (MFSA 2010-68)
- It is possible to steal information from a site in a
different domain using modal calls. (MFSA 2010-69)
- It is possible to establish a valid SSL connection
to a remote host, provided the SSL certificate was
created with a common name containing a wild card
followed by partial IP address of the remote host.
(MFSA 2010-70)
- A function used to load external libraries on Windows
platform could allow loading of unsafe DLLs thus
allowing binary planting attacks. (MFSA 2010-71)
- The SSL implementation allows servers to use
Diffie-Hellman Ephemeral mode (DHE) with a very
short key length. Such key lengths could be easily
breakable with modern hardware. (MFSA 2010-72)");
script_set_attribute(attribute:"see_also", value:"https://www.westpoint.ltd.uk/advisories/wp-10-0001.txt");
script_set_attribute(attribute:"see_also", value:"https://www.zerodayinitiative.com/advisories/ZDI-10-219/");
script_set_attribute(attribute:"see_also", value:"https://www.mozilla.org/en-US/security/advisories/mfsa2010-64/");
script_set_attribute(attribute:"see_also", value:"https://www.mozilla.org/en-US/security/advisories/mfsa2010-65/");
script_set_attribute(attribute:"see_also", value:"https://www.mozilla.org/en-US/security/advisories/mfsa2010-66/");
script_set_attribute(attribute:"see_also", value:"https://www.mozilla.org/en-US/security/advisories/mfsa2010-67/");
script_set_attribute(attribute:"see_also", value:"https://www.mozilla.org/en-US/security/advisories/mfsa2010-68/");
script_set_attribute(attribute:"see_also", value:"https://www.mozilla.org/en-US/security/advisories/mfsa2010-69/");
script_set_attribute(attribute:"see_also", value:"https://www.mozilla.org/en-US/security/advisories/mfsa2010-70/");
script_set_attribute(attribute:"see_also", value:"https://www.mozilla.org/en-US/security/advisories/mfsa2010-71/");
script_set_attribute(attribute:"see_also", value:"https://www.mozilla.org/en-US/security/advisories/mfsa2010-72/");
# https://www.mozilla.org/en-US/security/known-vulnerabilities/seamonkey-2.0/
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?dc608134");
script_set_attribute(attribute:"solution", value:"Upgrade to SeaMonkey 2.0.9 or later.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C");
script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
script_set_attribute(attribute:"exploit_available", value:"true");
script_set_attribute(attribute:"vuln_publication_date", value:"2010/08/14"); # MFSA 2010-70
script_set_attribute(attribute:"patch_publication_date", value:"2010/10/19");
script_set_attribute(attribute:"plugin_publication_date", value:"2010/10/21");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"cpe:/a:mozilla:seamonkey");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"Windows");
script_copyright(english:"This script is Copyright (C) 2010-2018 Tenable Network Security, Inc.");
script_dependencies("mozilla_org_installed.nasl");
script_require_keys("SeaMonkey/Version");
exit(0);
}
include("mozilla_version.inc");
port = get_kb_item("SMB/transport");
if (!port) port = 445;
installs = get_kb_list("SMB/SeaMonkey/*");
if (isnull(installs)) audit(AUDIT_NOT_INST, "SeaMonkey");
mozilla_check_version(installs:installs, product:'seamonkey', fix:'2.0.9', severity:SECURITY_HOLE);
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo