10 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
0.021 Low
EPSS
Percentile
89.2%
The installed version of SeaMonkey is a version prior to 2.26 and is, therefore, potentially affected by the following vulnerabilities :
An issue exists in the Network Security (NSS) library due to improper handling of IDNA domain prefixes for wildcard certificates. This issue could allow man-in- the-middle attacks. (CVE-2014-1492)
Memory issues exist that could lead to arbitrary code execution. (CVE-2014-1518, CVE-2014-1519)
An out-of-bounds read issue exists in the Web Audio feature that could lead to information disclosure.
(CVE-2014-1522)
An out-of-bounds read issue exists when decoding certain JPG images that could lead to a denial of service. (CVE-2014-1523)
A memory corruption issue exists due to improper validation of XBL objects that could lead to arbitrary code execution. (CVE-2014-1524)
A use-after-free memory issue exists in the Text Track Manager during HTML video processing that could lead to arbitrary code execution. (CVE-2014-1525)
An issue exists related to the debugger bypassing XrayWrappers that could lead to privilege escalation.
(CVE-2014-1526)
An out-of-bounds write issue exists in the Cairo graphics library that could lead to arbitrary code execution. Note that this issue only affects Firefox 28 and SeaMonkey prior to version 2.26. (CVE-2014-1528)
A security bypass issue exists in the Web Notification API that could lead to arbitrary code execution.
(CVE-2014-1529)
A cross-site scripting issue exists that could allow an attacker to load another website other than the URL for the website that is shown in the address bar.
(CVE-2014-1530)
A use-after-free issue exists due to an ‘imgLoader’ object being freed when being resized. This issue could lead to arbitrary code execution. (CVE-2014-1531)
A use-after-free issue exists during host resolution that could lead to arbitrary code execution.
(CVE-2014-1532)
#
# (C) Tenable Network Security, Inc.
#
include("compat.inc");
if (description)
{
script_id(73771);
script_version("1.12");
script_cvs_date("Date: 2019/11/26");
script_cve_id(
"CVE-2014-1492",
"CVE-2014-1518",
"CVE-2014-1519",
"CVE-2014-1522",
"CVE-2014-1523",
"CVE-2014-1524",
"CVE-2014-1525",
"CVE-2014-1526",
"CVE-2014-1528",
"CVE-2014-1529",
"CVE-2014-1530",
"CVE-2014-1531",
"CVE-2014-1532"
);
script_bugtraq_id(
66356,
67123,
67125,
67127,
67129,
67130,
67131,
67132,
67133,
67134,
67135,
67136,
67137
);
script_name(english:"SeaMonkey < 2.26 Multiple Vulnerabilities");
script_summary(english:"Checks version of SeaMonkey");
script_set_attribute(attribute:"synopsis", value:
"The remote Windows host contains a web browser that is potentially
affected by multiple vulnerabilities.");
script_set_attribute(attribute:"description", value:
"The installed version of SeaMonkey is a version prior to 2.26 and is,
therefore, potentially affected by the following vulnerabilities :
- An issue exists in the Network Security (NSS) library
due to improper handling of IDNA domain prefixes for
wildcard certificates. This issue could allow man-in-
the-middle attacks. (CVE-2014-1492)
- Memory issues exist that could lead to arbitrary code
execution. (CVE-2014-1518, CVE-2014-1519)
- An out-of-bounds read issue exists in the Web Audio
feature that could lead to information disclosure.
(CVE-2014-1522)
- An out-of-bounds read issue exists when decoding
certain JPG images that could lead to a denial of
service. (CVE-2014-1523)
- A memory corruption issue exists due to improper
validation of XBL objects that could lead to arbitrary
code execution. (CVE-2014-1524)
- A use-after-free memory issue exists in the Text Track
Manager during HTML video processing that could lead
to arbitrary code execution. (CVE-2014-1525)
- An issue exists related to the debugger bypassing
XrayWrappers that could lead to privilege escalation.
(CVE-2014-1526)
- An out-of-bounds write issue exists in the Cairo
graphics library that could lead to arbitrary code
execution. Note that this issue only affects Firefox
28 and SeaMonkey prior to version 2.26. (CVE-2014-1528)
- A security bypass issue exists in the Web Notification
API that could lead to arbitrary code execution.
(CVE-2014-1529)
- A cross-site scripting issue exists that could allow an
attacker to load another website other than the URL for
the website that is shown in the address bar.
(CVE-2014-1530)
- A use-after-free issue exists due to an 'imgLoader'
object being freed when being resized. This issue
could lead to arbitrary code execution. (CVE-2014-1531)
- A use-after-free issue exists during host resolution
that could lead to arbitrary code execution.
(CVE-2014-1532)");
script_set_attribute(attribute:"see_also", value:"https://www.mozilla.org/en-US/security/advisories/mfsa2014-34/");
script_set_attribute(attribute:"see_also", value:"https://www.mozilla.org/en-US/security/advisories/mfsa2014-36/");
script_set_attribute(attribute:"see_also", value:"https://www.mozilla.org/en-US/security/advisories/mfsa2014-37/");
script_set_attribute(attribute:"see_also", value:"https://www.mozilla.org/en-US/security/advisories/mfsa2014-38/");
script_set_attribute(attribute:"see_also", value:"https://www.mozilla.org/en-US/security/advisories/mfsa2014-39/");
script_set_attribute(attribute:"see_also", value:"https://www.mozilla.org/en-US/security/advisories/mfsa2014-41/");
script_set_attribute(attribute:"see_also", value:"https://www.mozilla.org/en-US/security/advisories/mfsa2014-42/");
script_set_attribute(attribute:"see_also", value:"https://www.mozilla.org/en-US/security/advisories/mfsa2014-43/");
script_set_attribute(attribute:"see_also", value:"https://www.mozilla.org/en-US/security/advisories/mfsa2014-44/");
script_set_attribute(attribute:"see_also", value:"https://www.mozilla.org/en-US/security/advisories/mfsa2014-45/");
script_set_attribute(attribute:"see_also", value:"https://www.mozilla.org/en-US/security/advisories/mfsa2014-46/");
script_set_attribute(attribute:"see_also", value:"https://www.mozilla.org/en-US/security/advisories/mfsa2014-47/");
script_set_attribute(attribute:"solution", value:
"Upgrade to SeaMonkey 2.26 or later.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2014-1532");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_set_attribute(attribute:"exploit_available", value:"false");
script_cwe_id(20, 74, 79, 442, 629, 711, 712, 722, 725, 750, 751, 800, 801, 809, 811, 864, 900, 928, 931, 990);
script_set_attribute(attribute:"vuln_publication_date", value:"2014/03/28");
script_set_attribute(attribute:"patch_publication_date", value:"2014/04/29");
script_set_attribute(attribute:"plugin_publication_date", value:"2014/04/29");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"cpe:/a:mozilla:seamonkey");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"Windows");
script_copyright(english:"This script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("mozilla_org_installed.nasl");
script_require_keys("SeaMonkey/Version");
exit(0);
}
include("mozilla_version.inc");
port = get_kb_item("SMB/transport");
if (!port) port = 445;
installs = get_kb_list("SMB/SeaMonkey/*");
if (isnull(installs)) audit(AUDIT_NOT_INST, "SeaMonkey");
mozilla_check_version(installs:installs, product:'seamonkey', fix:'2.26', severity:SECURITY_HOLE, xss:TRUE);
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1492
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1518
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1519
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1522
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1523
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1524
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1525
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1526
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1528
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1529
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1530
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1531
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1532
www.mozilla.org/en-US/security/advisories/mfsa2014-34/
www.mozilla.org/en-US/security/advisories/mfsa2014-36/
www.mozilla.org/en-US/security/advisories/mfsa2014-37/
www.mozilla.org/en-US/security/advisories/mfsa2014-38/
www.mozilla.org/en-US/security/advisories/mfsa2014-39/
www.mozilla.org/en-US/security/advisories/mfsa2014-41/
www.mozilla.org/en-US/security/advisories/mfsa2014-42/
www.mozilla.org/en-US/security/advisories/mfsa2014-43/
www.mozilla.org/en-US/security/advisories/mfsa2014-44/
www.mozilla.org/en-US/security/advisories/mfsa2014-45/
www.mozilla.org/en-US/security/advisories/mfsa2014-46/
www.mozilla.org/en-US/security/advisories/mfsa2014-47/
10 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
0.021 Low
EPSS
Percentile
89.2%