Scriptable plugin execution in SeaMonkey mail

Related Vulnerabilities: CVE-2009-3385  

Mozilla Foundation Security Advisory 2010-06

Scriptable plugin execution in SeaMonkey mail

Announced
March 16, 2010
Reporter
Georgi Guninski
Impact
Critical
Products
SeaMonkey
Fixed in
  • SeaMonkey 1.1.19

Description

Security researcher Georgi Guninski reported that scriptable plugin content, such as Flash objects, could be loaded and executed in SeaMonkey mail messages by embedding the content in an iframe inside the message. If a user were to reply to or forward such a message, malicious JavaScript embedded in the plugin content could potentially steal the contents of the message or files from the local filesystem.

Thunderbird was not affected by this issue.

References