Kaspersky ID:
KLA11454
Дата обнаружения:
22/09/2015
Обновлено:
03/06/2020

Описание

Multiple vulnerabilities were found in SeaMonkey. Malicious users can exploit these vulnerabilities to execute arbitrary code, cause denial of service, bypass security restrictions and spoof user interface.

Below is a complete list of vulnerabilities:

  1. Multiple memory corruption vulnerabilities in SeaMonkey can be exploited remotely to cause denial of service or execute arbitrary code;
  2. Memory leak vulnerability in SeaMonkey can be exploited to bypass security restrictions;
  3. Vulnerability related to ECMAScript 5 API in SeaMonkey can be exploited to execute arbitrary code;
  4. Vulnerability related to dragging and dropping images in SeaMonkey can be exploited to bypass security restrictions;
  5. Vulnerability related to handling of CORS preflight request headers in SeaMonkey can be exploited to bypass security restrictions;
  6. Memory safety vulnerabilities in libGLES in the ANGLE graphics library in SeaMonkey can be exploited to cause denial of service;
  7. Out of bounds read vulnerability in SeaMonkey can be exploited to cause denial of service;
  8. Vulnerability related to using the debugger API in SeaMonkey can be exploited to cause denial of service;
  9. Vulnerability related to manipulating the loaded URL in SeaMonkey can be exploited to spoof user interface;
  10. Use-after-free vulnerability in SeaMonkey can be exploited to cause denial of service;
  11. Buffer overflow vulnerability in SeaMonkey can be exploited to cause denial of service;
  12. Out of bounds read vulnerability in SeaMonkey can be exploited to bypass security restrictions;
  13. Vulnerability related to creating a scripted proxy by web page in SeaMonkey can be exploited to bypass security restrictions.

Первичный источник обнаружения

Связанные продукты

Список CVE

  • CVE-2015-7180
    critical
  • CVE-2015-7179
    critical
  • CVE-2015-7178
    critical
  • CVE-2015-7177
    critical
  • CVE-2015-7176
    critical
  • CVE-2015-7175
    critical
  • CVE-2015-7174
    critical
  • CVE-2015-4522
    critical
  • CVE-2015-4521
    critical
  • CVE-2015-4520
    high
  • CVE-2015-4519
    warning
  • CVE-2015-4517
    critical
  • CVE-2015-4516
    critical
  • CVE-2015-4512
    high
  • CVE-2015-4511
    high
  • CVE-2015-4510
    high
  • CVE-2015-4509
    critical
  • CVE-2015-4508
    warning
  • CVE-2015-4507
    high
  • CVE-2015-4506
    high
  • CVE-2015-4504
    high
  • CVE-2015-4503
    critical
  • CVE-2015-4502
    warning
  • CVE-2015-4501
    critical
  • CVE-2015-4500
    critical

Смотрите также

Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com

Нашли неточность в описании этой уязвимости? Дайте нам знать!
Kaspersky IT Security Calculator:
Оцените ваш профиль кибербезопасности
Узнать больше
Встречай новый Kaspersky!
Каждая минута твоей онлайн-жизни заслуживает топовой защиты.
Узнать больше
Confirm changes?
Your message has been sent successfully.