Mozilla SeaMonkey Multiple Vulnerabilities-01 Nov13 (Windows)

Summary
This host is installed with Mozilla Seamonkey and is prone to multiple vulnerabilities.
Impact
Successful exploitation will allow attackers to execute arbitrary code, cause a denial of service, spoof the address bar, conduct clickjacking attacks and conduct buffer overflow attacks. Impact Level: System/Application
Solution
Upgrade to version 2.22 or later, For updates refer to http://www.mozilla.org/projects/seamonkey
Insight
Multiple flaws due to, - Use-after-free vulnerability in the 'nsContentUtils::ContentIsHostIncludingDescendantOf' function. - Improper data initialization in the 'txXPathNodeUtils::getBaseURI' function. - An error in 'Worker::SetEventListener' function in Web workers implementation. - Use-after-free vulnerability in the 'nsEventListenerManager::SetEventHandler' function. - Use-after-free vulnerability in 'nsIOService::NewChannelFromURIWithProxyFlags' function. - Use-after-free vulnerability in the 'nsIPresShell::GetPresContext' function. - Use-after-free vulnerability in 'nsDocLoader::doStopDocumentLoad' function. - Multiple unspecified vulnerabilities in the browser engine. - Improper restriction of the nature or placement of HTML within a dropdown menu. - Improper memory allocation for unspecified functions by JavaScript engine. - Improper determination of the thread for release of an image object.
Affected
Mozilla SeaMonkey before version 2.22 on Windows
Detection
Get the installed version with the help of detect NVT and check the version is vulnerable or not.
References