Skip to main content

Mozilla SeaMonkey Multiple Vulnerabilities

Last Update Date: 28 Jan 2011 Release Date: 19 Mar 2010 5586 Views

RISK: Medium Risk

Multiple vulnerabilities have been identified in Mozilla SeaMonkey, which could be exploited by attackers to manipulate or disclose certain data, bypass security restrictions or compromise a vulnerable system.

1. An error when handling scriptable plugin content (e.g. Flash objects) embedded in an iframe inside a mail message, which could cause malicious contents to be loaded and executed when a user replies to or forwards the message.

2. A memory corruption error related to SSPI authentication and Active Directory, which could be exploited to potentially execute arbitrary code.

3. A memory corruption error when indexing messages with certain MIME attachments, which could be exploited to potentially execute arbitrary code.

Various other vulnerabilities have been reported in previous Mozilla products security alert.


Impact

  • Remote Code Execution
  • Security Restriction Bypass
  • Information Disclosure

System / Technologies affected

  • SeaMonkey versions prior to 1.1.19

Solutions

Before installation of the software, please visit the software manufacturer web-site for more details.


Vulnerability Identifier


Source