Summary
The host is installed with Mozilla Seamonkey and is prone to multiple vulnerabilities.
Impact
Successful exploitation could result in remote arbitrary code execution, bypass security restrictions, spoofing attacks, sensitive information disclosure, and JavaScript code that can be executed with the privileges of the signed user.
Impact Level: System
Solution
Upgrade to Seamonkey version 1.1.13 or later
http://www.seamonkey-project.org/releases/
Affected
Seamonkey version prior to 1.1.13 on Linux.
References
- http://www.mozilla.org/security/announce/2008/mfsa2008-48.html
- http://www.mozilla.org/security/announce/2008/mfsa2008-49.html
- http://www.mozilla.org/security/announce/2008/mfsa2008-50.html
- http://www.mozilla.org/security/announce/2008/mfsa2008-52.html
- http://www.mozilla.org/security/announce/2008/mfsa2008-54.html
- http://www.mozilla.org/security/announce/2008/mfsa2008-55.html
- http://www.mozilla.org/security/announce/2008/mfsa2008-56.html
- http://www.mozilla.org/security/announce/2008/mfsa2008-57.html
- http://www.mozilla.org/security/announce/2008/mfsa2008-58.html
Updated on 2015-03-25
Severity
Classification
-
CVE CVE-2008-0017, CVE-2008-5012, CVE-2008-5013, CVE-2008-5014, CVE-2008-5016, CVE-2008-5017, CVE-2008-5018, CVE-2008-5021, CVE-2008-5022, CVE-2008-5023, CVE-2008-5024, CVE-2008-5052 -
CVSS Base Score: 10.0
AV:N/AC:L/Au:N/C:C/I:C/A:C
Related Vulnerabilities