Mozilla Products Multiple Vulnerabilities feb-10 (Win)

Summary
The host is installed with Mozilla Firefox/Seamonkey and is prone to multiple vulnerabilities.
Impact
Successful exploitation will let attackers to potentially execute arbitrary code or compromise a user's system. Impact Level: Application
Solution
Upgrade to Firefox version 3.0.18 or 3.5.8 or later http://www.mozilla.com/en-US/firefox/all.html Upgrade to Seamonkey version 2.0.3 or later http://www.seamonkey-project.org/releases/
Insight
- An error exists in the implementation of Web Worker array data types when processing posted messages. This can be exploited to corrupt memory and potentially execute arbitrary code. - An error exists in the implementation of the 'showModalDialog()' function, can be exploited to potentially execute arbitrary JavaScript code in the context of a domain calling the affected function with external parameters. - An error exists when processing SVG documents served with a Content-Type of 'application/octet-stream', can be exploited to execute arbitrary JavaScript code in the context of a domain hosting the SVG document.
Affected
Seamonkey version prior to 2.0.3 Firefox version 3.0.x before 3.0.18 and 3.5.x before 3.5.8 on Windows.
References