KLA11454
Multiple vulnerabilities in SeaMonkey

Обновлено: 03/06/2020
Дата обнаружения
22/09/2015
Уровень угрозы
Critical
Описание

Multiple vulnerabilities were found in SeaMonkey. Malicious users can exploit these vulnerabilities to execute arbitrary code, cause denial of service, bypass security restrictions and spoof user interface.

Below is a complete list of vulnerabilities:

  1. Multiple memory corruption vulnerabilities in SeaMonkey can be exploited remotely to cause denial of service or execute arbitrary code;
  2. Memory leak vulnerability in SeaMonkey can be exploited to bypass security restrictions;
  3. Vulnerability related to ECMAScript 5 API in SeaMonkey can be exploited to execute arbitrary code;
  4. Vulnerability related to dragging and dropping images in SeaMonkey can be exploited to bypass security restrictions;
  5. Vulnerability related to handling of CORS preflight request headers in SeaMonkey can be exploited to bypass security restrictions;
  6. Memory safety vulnerabilities in libGLES in the ANGLE graphics library in SeaMonkey can be exploited to cause denial of service;
  7. Out of bounds read vulnerability in SeaMonkey can be exploited to cause denial of service;
  8. Vulnerability related to using the debugger API in SeaMonkey can be exploited to cause denial of service;
  9. Vulnerability related to manipulating the loaded URL in SeaMonkey can be exploited to spoof user interface;
  10. Use-after-free vulnerability in SeaMonkey can be exploited to cause denial of service;
  11. Buffer overflow vulnerability in SeaMonkey can be exploited to cause denial of service;
  12. Out of bounds read vulnerability in SeaMonkey can be exploited to bypass security restrictions;
  13. Vulnerability related to creating a scripted proxy by web page in SeaMonkey can be exploited to bypass security restrictions.
Пораженные продукты

SeaMonkey versions earlier than 2.38

Решение

Update to the latest version
Download SeaMonkey

Первичный источник обнаружения
Advisories for SeaMonkey 2.38
Оказываемое влияние
?
ACE 
[?]

DoS 
[?]

SB 
[?]

SUI 
[?]
Связанные продукты
Mozilla SeaMonkey
CVE-IDS
CVE-2015-71807.5Critical
CVE-2015-71797.5Critical
CVE-2015-71787.5Critical
CVE-2015-71777.5Critical
CVE-2015-71767.5Critical
CVE-2015-71757.5Critical
CVE-2015-71747.5Critical
CVE-2015-45227.5Critical
CVE-2015-45217.5Critical
CVE-2015-45206.4High
CVE-2015-45194.3Warning
CVE-2015-45177.5Critical
CVE-2015-45169.3Critical
CVE-2015-45126.4High
CVE-2015-45116.8High
CVE-2015-45106.8High
CVE-2015-45097.5Critical
CVE-2015-45082.6Warning
CVE-2015-45075.1High
CVE-2015-45066.8High
CVE-2015-45046.4High
CVE-2015-45035.0Critical
CVE-2015-45024.3Warning
CVE-2015-45017.5Critical
CVE-2015-45007.5Critical
Узнай статистику распространения уязвимостей в твоем регионе