Summary
The host is installed with Mozilla Seamonkey and is prone to multiple vulnerabilities.
Impact
Successful exploitation could result in remote arbitrary code execution, bypass security restrictions, spoofing attacks, sensitive information disclosure, and JavaScript code that can be executed with the privileges of the signed user.
Impact Level: System
Solution
Upgrade to Seamonkey version 1.1.13 or later
http://www.seamonkey-project.org/releases/
Affected
Seamonkey version prior to 1.1.13 on Windows.
References
- http://www.mozilla.org/security/announce/2008/mfsa2008-48.html
- http://www.mozilla.org/security/announce/2008/mfsa2008-49.html
- http://www.mozilla.org/security/announce/2008/mfsa2008-50.html
- http://www.mozilla.org/security/announce/2008/mfsa2008-52.html
- http://www.mozilla.org/security/announce/2008/mfsa2008-54.html
- http://www.mozilla.org/security/announce/2008/mfsa2008-55.html
- http://www.mozilla.org/security/announce/2008/mfsa2008-56.html
- http://www.mozilla.org/security/announce/2008/mfsa2008-57.html
- http://www.mozilla.org/security/announce/2008/mfsa2008-58.html
Updated on 2015-03-25
Severity
Classification
-
CVE CVE-2008-0017, CVE-2008-5012, CVE-2008-5013, CVE-2008-5014, CVE-2008-5016, CVE-2008-5017, CVE-2008-5018, CVE-2008-5021, CVE-2008-5022, CVE-2008-5023, CVE-2008-5024, CVE-2008-5052 -
CVSS Base Score: 10.0
AV:N/AC:L/Au:N/C:C/I:C/A:C
Related Vulnerabilities
- Adobe Air Multiple Vulnerabilities -01 August 12 (Windows)
- Adobe Acrobat Multiple Vulnerabilities - Windows
- Adobe Acrobat and Reader PDF Handling Multiple Vulnerabilities (Windows)
- Adobe Flash Player 'SWF' File Multiple Code Execution Vulnerability - Windows
- Aastra IP Telephone Hardcoded Telnet Password Security Bypass Vulnerability