SeaMonkey Multiple Vulnerabilities-01 Jan15 (Windows)

Summary
This host is installed with SeaMonkey and is prone to multiple vulnerabilities.
Impact
Successful exploitation will allow remote attackers to disclose potentially sensitive information, bypass certain security restrictions, and compromise a user's system. Impact Level: System/Application
Solution
Upgrade to SeaMonkey version 2.32 or later, For updates refer to http://www.mozilla.com/en-US/seamonkey
Insight
Multiple flaws exist due to, - Some unspecified errors. - An error when rendering a bitmap image by the bitmap decoder within a canvas element. - An error when handling a request from 'navigator.sendBeacon' API interface function. - An error when handling a '407 Proxy Authentication' response with a 'Set-Cookie' header from a web proxy. - A use-after-free error when handling tracks within WebRTC. - An error when handling the 'id-pkix-ocsp-nocheck' extension during verification of a delegated OCSP (Online Certificate Status Protocol) response signing certificate. - An error when handling DOM (Document Object Model) objects with certain properties. - Improper restriction of timeline operations by the 'mozilla::dom::AudioParamTimeline::AudioNodeInputValue' function in the Web Audio API.
Affected
SeaMonkey version before 2.32 on Windows.
Detection
Get the installed version with the help of detect NVT and check the version is vulnerable or not.
References