SeaMonkey 2.x < 2.7.2 'png_decompress_chunk' Integer Overflow

high Nessus Network Monitor Plugin ID 6329

Synopsis

The remote host has a web browser installed that is affected by an integer overflow vulnerability.

Description

Versions of SeaMonkey 2.x earlier than 2.7.2 are potentially affected by an integer overflow vulnerability in 'libpng', a library used by this application. When decompressing certain PNG image files, this error can allow a heap-based buffer overflow which can crash the application or potentially allow code execution.

Solution

Upgrade to SeaMonkey 2.7.2 or later.

See Also

http://www.mozilla.org/security/known-vulnerabilities/seamonkey.html#seamonkey2.7.2

http://www.mozilla.org/security/announce/2012/mfsa2012-11.html

Plugin Details

Severity: High

ID: 6329

Family: Web Clients

Published: 2/20/2012

Updated: 3/6/2019

Nessus ID: 58009

Risk Information

VPR

Risk Factor: Medium

Score: 6.6

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 6.9

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

CVSS v3

Risk Factor: High

Base Score: 7.4

Temporal Score: 6.4

Vector: CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:X

Vulnerability Information

CPE: cpe:/a:mozilla:seamonkey

Patch Publication Date: 2/16/2012

Vulnerability Publication Date: 2/16/2012

Reference Information

CVE: CVE-2011-3026

BID: 52049