CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
EPSS
Percentile
98.0%
The installed version of SeaMonkey is earlier than 2.0.7. Such versions are potentially affected by the following security issues :
Multiple memory safety bugs could lead to memory corruption, potentially resulting in arbitrary code execution. (MFSA 2010-49)
An integer overflow vulnerability in HTML frameset element implementation could lead to arbitrary code execution.
(MFSA 2010-50)
A dangling pointer vulnerability in ‘navigator.plugins’ could lead to arbitrary code execution. (MFSA 2010-51)
It is possible to perform DLL hijacking attacks via dwmapi.dll. (MFSA 2010-52)
A heap overflow vulnerability in function ‘nsTextFrameUtils::TransformText’ could result in arbitrary code execution on the remote system.
(MFSA 2010-53)
A dangling pointer vulnerability reported in MFSA 2010-40 was incorrectly fixed. (MFSA 2010-54)
By manipulating XUL <tree> objects it may be possible to crash the browser or run arbitrary code on the remote system. (MFSA 2010-55)
A dangling pointer vulnerability affects XUL <tree>'s content view implementation, which could allow arbitrary code execution on the remote system. (MFSA 2010-56)
Code used to normalize a document could lead to a crash or arbitrary code execution on the remote system.
(MFSA 2010-57)
A specially crafted font could trigger memory corruption on Mac systems, potentially resulting in arbitrary code execution on the remote system. (MFSA 2010-58)
It is possible to trigger a cross-site scripting vulnerability using SJOW scripted function.
(MFSA 2010-60)
The ‘type’ attribute of an <object> tag could override charset of a framed HTML document, which could allow an attacker to inject and execute UTF-7 encoded JavaScript code into a website. (MFSA 2010-61)
Copy-and-paste or drag-and-drop of an HTML selection containing JavaScript into a designMode document could trigger a cross-site scripting vulnerability. (MFSA 2010-62)
It is possible to read sensitive information via ‘statusText’ property of an XMLHttpRequest object.
(MFSA 2010-63)
#
# (C) Tenable Network Security, Inc.
#
if (NASL_LEVEL < 3000) exit(1, "The plugin description is longer than 3191 characters.");
include("compat.inc");
if (description)
{
script_id(49149);
script_version("1.19");
script_cvs_date("Date: 2018/07/27 18:38:15");
script_cve_id(
"CVE-2010-2760",
"CVE-2010-2763",
"CVE-2010-2764",
"CVE-2010-2765",
"CVE-2010-2766",
"CVE-2010-2767",
"CVE-2010-2768",
"CVE-2010-2769",
"CVE-2010-2770",
"CVE-2010-3131",
"CVE-2010-3166",
"CVE-2010-3167",
"CVE-2010-3168",
"CVE-2010-3169"
);
script_bugtraq_id(
42654,
43091,
43093,
43094,
43095,
43096,
43097,
43100,
43101,
43102,
43104,
43106,
43108,
43118
);
script_xref(name:"Secunia", value:"41299");
script_name(english:"SeaMonkey < 2.0.7 Multiple Vulnerabilities ");
script_summary(english:"Checks version of SeaMonkey");
script_set_attribute(attribute:"synopsis",value:
"The remote Windows host contains a web browser that is affected by
multiple vulnerabilities."
);
script_set_attribute(attribute:"description",value:
"The installed version of SeaMonkey is earlier than 2.0.7. Such
versions are potentially affected by the following security issues :
- Multiple memory safety bugs could lead to memory
corruption, potentially resulting in arbitrary
code execution. (MFSA 2010-49)
- An integer overflow vulnerability in HTML frameset element
implementation could lead to arbitrary code execution.
(MFSA 2010-50)
- A dangling pointer vulnerability in 'navigator.plugins'
could lead to arbitrary code execution. (MFSA 2010-51)
- It is possible to perform DLL hijacking attacks via
dwmapi.dll. (MFSA 2010-52)
- A heap overflow vulnerability in function
'nsTextFrameUtils::TransformText' could result in
arbitrary code execution on the remote system.
(MFSA 2010-53)
- A dangling pointer vulnerability reported in
MFSA 2010-40 was incorrectly fixed. (MFSA 2010-54)
- By manipulating XUL <tree> objects it may be possible
to crash the browser or run arbitrary code on the
remote system. (MFSA 2010-55)
- A dangling pointer vulnerability affects XUL <tree>'s
content view implementation, which could allow arbitrary
code execution on the remote system. (MFSA 2010-56)
- Code used to normalize a document could lead to a crash
or arbitrary code execution on the remote system.
(MFSA 2010-57)
- A specially crafted font could trigger memory corruption
on Mac systems, potentially resulting in arbitrary code
execution on the remote system. (MFSA 2010-58)
- It is possible to trigger a cross-site scripting
vulnerability using SJOW scripted function.
(MFSA 2010-60)
- The 'type' attribute of an <object> tag could override
charset of a framed HTML document, which could allow
an attacker to inject and execute UTF-7 encoded
JavaScript code into a website. (MFSA 2010-61)
- Copy-and-paste or drag-and-drop of an HTML selection
containing JavaScript into a designMode document
could trigger a cross-site scripting vulnerability.
(MFSA 2010-62)
- It is possible to read sensitive information via
'statusText' property of an XMLHttpRequest object.
(MFSA 2010-63)");
script_set_attribute(attribute:"see_also", value:"https://www.mozilla.org/en-US/security/advisories/mfsa2010-49/");
script_set_attribute(attribute:"see_also", value:"https://www.mozilla.org/en-US/security/advisories/mfsa2010-50/");
script_set_attribute(attribute:"see_also", value:"https://www.mozilla.org/en-US/security/advisories/mfsa2010-51/");
script_set_attribute(attribute:"see_also", value:"https://www.mozilla.org/en-US/security/advisories/mfsa2010-52/");
script_set_attribute(attribute:"see_also", value:"https://www.mozilla.org/en-US/security/advisories/mfsa2010-53/");
script_set_attribute(attribute:"see_also", value:"https://www.mozilla.org/en-US/security/advisories/mfsa2010-54/");
script_set_attribute(attribute:"see_also", value:"https://www.mozilla.org/en-US/security/advisories/mfsa2010-55/");
script_set_attribute(attribute:"see_also", value:"https://www.mozilla.org/en-US/security/advisories/mfsa2010-56/");
script_set_attribute(attribute:"see_also", value:"https://www.mozilla.org/en-US/security/advisories/mfsa2010-57/");
script_set_attribute(attribute:"see_also", value:"https://www.mozilla.org/en-US/security/advisories/mfsa2010-58/");
script_set_attribute(attribute:"see_also", value:"https://www.mozilla.org/en-US/security/advisories/mfsa2010-60/");
script_set_attribute(attribute:"see_also", value:"https://www.mozilla.org/en-US/security/advisories/mfsa2010-61/");
script_set_attribute(attribute:"see_also", value:"https://www.mozilla.org/en-US/security/advisories/mfsa2010-62/");
script_set_attribute(attribute:"see_also", value:"https://www.mozilla.org/en-US/security/advisories/mfsa2010-63/");
# https://www.mozilla.org/en-US/security/known-vulnerabilities/seamonkey-2.0/
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?dc608134");
script_set_attribute(attribute:"solution", value:"Upgrade to SeaMonkey 2.0.7 or later.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C");
script_set_cvss_temporal_vector("CVSS2#E:F/RL:OF/RC:C");
script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
script_set_attribute(attribute:"exploit_available", value:"true");
script_set_attribute(attribute:"exploit_framework_core", value:"true");
script_set_attribute(attribute:"vuln_publication_date", value:"2010/09/07");
script_set_attribute(attribute:"patch_publication_date", value:"2010/09/07");
script_set_attribute(attribute:"plugin_publication_date", value:"2010/09/08");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"cpe:/a:mozilla:seamonkey");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"Windows");
script_copyright(english:"This script is Copyright (C) 2010-2018 Tenable Network Security, Inc.");
script_dependencies("mozilla_org_installed.nasl");
script_require_keys("SeaMonkey/Version");
exit(0);
}
include("mozilla_version.inc");
port = get_kb_item("SMB/transport");
if (!port) port = 445;
installs = get_kb_list("SMB/SeaMonkey/*");
if (isnull(installs)) audit(AUDIT_NOT_INST, "SeaMonkey");
mozilla_check_version(installs:installs, product:'seamonkey', fix:'2.0.7', severity:SECURITY_HOLE);
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2760
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2763
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2764
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2765
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2766
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2767
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2768
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2769
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2770
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3131
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3166
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3167
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3168
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3169
www.nessus.org/u?dc608134
www.mozilla.org/en-US/security/advisories/mfsa2010-49/
www.mozilla.org/en-US/security/advisories/mfsa2010-50/
www.mozilla.org/en-US/security/advisories/mfsa2010-51/
www.mozilla.org/en-US/security/advisories/mfsa2010-52/
www.mozilla.org/en-US/security/advisories/mfsa2010-53/
www.mozilla.org/en-US/security/advisories/mfsa2010-54/
www.mozilla.org/en-US/security/advisories/mfsa2010-55/
www.mozilla.org/en-US/security/advisories/mfsa2010-56/
www.mozilla.org/en-US/security/advisories/mfsa2010-57/
www.mozilla.org/en-US/security/advisories/mfsa2010-58/
www.mozilla.org/en-US/security/advisories/mfsa2010-60/
www.mozilla.org/en-US/security/advisories/mfsa2010-61/
www.mozilla.org/en-US/security/advisories/mfsa2010-62/
www.mozilla.org/en-US/security/advisories/mfsa2010-63/