Summary
This host is installed with Mozilla Seamonkey and is prone to multiple vulnerabilities.
Impact
Successful exploitation could allow attackers to inject scripts, bypass certain security restrictions, execute arbitrary code in the context of the browser.
Impact Level: System/Application
Solution
Upgrade to SeaMonkey version to 2.14 or later,
http://www.mozilla.org/projects/seamonkey
Insight
Multiple error exists
- When combining SVG text with the setting of CSS properties.
- Within the 'copyTexImage2D' implementation in the WebGL subsystem and in the XrayWrapper implementation.
- Within 'str_unescape' in the Javascript engin and in 'XMLHttpRequest' objects created within sandboxes.
Affected
SeaMonkey version before 2.14 on Windows
References
- http://secunia.com/advisories/51358
- http://securitytracker.com/id?1027791
- http://securitytracker.com/id?1027792
- http://www.mozilla.org/security/announce/2012/mfsa2012-91.html
- http://www.mozilla.org/security/announce/2012/mfsa2012-94.html
- http://www.mozilla.org/security/announce/2012/mfsa2012-96.html
- http://www.mozilla.org/security/announce/2012/mfsa2012-97.html
- http://www.mozilla.org/security/announce/2012/mfsa2012-99.html
- http://www.mozilla.org/security/announce/2012/mfsa2012-105.html
- http://www.mozilla.org/security/announce/2012/mfsa2012-106.html
- http://www.osvdb.org/87589
Updated on 2015-03-25
Severity
Classification
-
CVE CVE-2012-4204, CVE-2012-4205, CVE-2012-4208, CVE-2012-4212, CVE-2012-4213, CVE-2012-4217, CVE-2012-5836, CVE-2012-5838, CVE-2012-5843 -
CVSS Base Score: 10.0
AV:N/AC:L/Au:N/C:C/I:C/A:C
Related Vulnerabilities
- Adobe AIR Code Execution and DoS Vulnerabilities Nov13 (Windows)
- Adobe Flash Player 9.0.115.0 and earlier vulnerability (Lin)
- Adobe Acrobat Unspecified vulnerability
- Adobe Flash Player Arbitrary Code Execution Vulnerability - 01 Feb14 (Windows)
- Aastra IP Telephone Hardcoded Telnet Password Security Bypass Vulnerability