Summary
The host is installed with Mozilla firefox/thunderbird/seamonkey and is prone to multiple vulnerabilities.
Impact
Successful exploitation will let attackers to bypass intended access restrictions via a crafted web site and cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
Impact Level: System/Application
Solution
Upgrade to Mozilla Firefox version 3.6.23 or 7 later, For updates refer to http://www.mozilla.com/en-US/firefox/all.html
Upgrade to SeaMonkey version to 2.4 or later
http://www.mozilla.org/projects/seamonkey/
Upgrade to Thunderbird version to 7.0 or later
http://www.mozilla.org/en-US/thunderbird/
Insight
The flaws are due to
- A malicious application or extension could be downloaded and executed if a user is convinced into holding down the 'Enter' key via e.g. a malicious game.
- Some unspecified errors can be exploited to corrupt memory.
- Error while handling HTTP responses that contain multiple Location, Content-Length, or Content-Disposition headers, which allows remote attackers to conduct HTTP response splitting attacks via crafted header values.
Affected
SeaMonkey version prior to 2.4
Thunderbird version prior to 7.0
Mozilla Firefox version prior to 3.6.23 and 4.x through 6
References
Severity
Classification
-
CVE CVE-2011-2372, CVE-2011-2995, CVE-2011-3000 -
CVSS Base Score: 10.0
AV:N/AC:L/Au:N/C:C/I:C/A:C
Related Vulnerabilities