Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:23545
HistoryApr 06, 2010 - 12:00 a.m.

Mozilla Foundation Security Advisory 2010-06

2010-04-0600:00:00
vulners.com
11

You are here: Security Center > Mozilla Foundation Security Advisories > MFSA 2010-06
Mozilla Foundation Security Advisory 2010-06

Title: Scriptable plugin execution in SeaMonkey mail
Impact: Critical
Announced: March 16, 2010
Reporter: Georgi Guninski
Products: SeaMonkey

Fixed in: SeaMonkey 1.1.19
Description

Security researcher Georgi Guninski reported that scriptable plugin content, such as Flash objects, could be loaded and executed in SeaMonkey mail messages by embedding the content in an iframe inside the message. If a user were to reply to or forward such a message, malicious JavaScript embedded in the plugin content could potentially steal the contents of the message or files from the local filesystem.

Thunderbird was not affected by this issue.
References

* https://bugzilla.mozilla.org/show_bug.cgi?id=371976
* CVE-2009-3385
Related for SECURITYVULNS:DOC:23545