English | Deutsch | Español | Português
 ID de Usuario:
 Contraseña:
Nuevo usuario
 Acerca de:   Dedicada | Avanzada | Estándar | Periódica | Sin Riesgo | Escritorio | Básica | Individual | Sello | FAQ
  Resumen de Precio/Funciones | Ordenar  | Nuevas Vulnerabilidades | Confidencialidad | Búsqueda de Vulnerabilidad
 Búsqueda de    
Vulnerabilidad   
    Buscar 73247 Descripciones CVE y
39212 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.57716
Categoría:Red Hat Local Security Checks
Título:RedHat Security Advisory RHSA-2006:0759
Resumen:Redhat Security Advisory RHSA-2006:0759
Descripción:
The remote host is missing updates announced in
advisory RHSA-2006:0759.

SeaMonkey is an open source Web browser, advanced email and newsgroup
client, IRC chat client, and HTML editor.

Several flaws were found in the way SeaMonkey processes certain malformed
Javascript code. A malicious web page could cause the execution of
Javascript code in such a way that could cause SeaMonkey to crash or
execute arbitrary code as the user running SeaMonkey. (CVE-2006-6498,
CVE-2006-6501, CVE-2006-6502, CVE-2006-6503, CVE-2006-6504)

Several flaws were found in the way SeaMonkey renders web pages. A
malicious web page could cause the browser to crash or possibly execute
arbitrary code as the user running SeaMonkey. (CVE-2006-6497)

A heap based buffer overflow flaw was found in the way SeaMonkey Mail
parses the Content-Type mail header. A malicious mail message could cause
the SeaMonkey Mail client to crash or possibly execute arbitrary code as
the user running SeaMonkey Mail. (CVE-2006-6505)

Users of SeaMonkey are advised to upgrade to these erratum packages, which
contain SeaMonkey version 1.0.7 that corrects these issues.

Solution:
Please note that this update is available via
Red Hat Network. To use Red Hat Network, launch the Red
Hat Update Agent with the following command: up2date

http://rhn.redhat.com/errata/RHSA-2006-0759.html
http://www.redhat.com/security/updates/classification/#critical

Risk factor : Critical
Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2006-6497
Bugtraq: 20070102 rPSA-2006-0234-2 firefox thunderbird (Google Search)
http://www.securityfocus.com/archive/1/archive/1/455728/100/200/threaded
Bugtraq: 20061222 rPSA-2006-0234-1 firefox (Google Search)
http://www.securityfocus.com/archive/1/archive/1/455145/100/0/threaded
Debian Security Information: DSA-1253 (Google Search)
http://www.debian.org/security/2007/dsa-1253
Debian Security Information: DSA-1258 (Google Search)
http://www.debian.org/security/2007/dsa-1258
Debian Security Information: DSA-1265 (Google Search)
http://www.debian.org/security/2007/dsa-1265
http://fedoranews.org/cms/node/2297
http://fedoranews.org/cms/node/2338
http://security.gentoo.org/glsa/glsa-200701-02.xml
http://www.gentoo.org/security/en/glsa/glsa-200701-03.xml
http://www.gentoo.org/security/en/glsa/glsa-200701-04.xml
HPdes Security Advisory: HPSBUX02153
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742
HPdes Security Advisory: SSRT061181
http://www.mandriva.com/security/advisories?name=MDKSA-2007:010
http://www.mandriva.com/security/advisories?name=MDKSA-2007:011
RedHat Security Advisories: RHSA-2006:0758
http://rhn.redhat.com/errata/RHSA-2006-0758.html
RedHat Security Advisories: RHSA-2006:0759
http://rhn.redhat.com/errata/RHSA-2006-0759.html
RedHat Security Advisories: RHSA-2006:0760
http://rhn.redhat.com/errata/RHSA-2006-0760.html
SGI Security Advisory: 20061202-01-P
ftp://patches.sgi.com/support/free/security/advisories/20061202-01-P.asc
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102885-1
SuSE Security Announcement: SUSE-SA:2006:080 (Google Search)
http://www.novell.com/linux/security/advisories/2006_80_mozilla.html
SuSE Security Announcement: SUSE-SA:2007:006 (Google Search)
http://www.novell.com/linux/security/advisories/2007_06_mozilla.html
http://www.ubuntu.com/usn/usn-398-1
http://www.ubuntu.com/usn/usn-398-2
http://www.ubuntu.com/usn/usn-400-1
Cert/CC Advisory: TA06-354A
http://www.us-cert.gov/cas/techalerts/TA06-354A.html
CERT/CC vulnerability note: VU#606260
http://www.kb.cert.org/vuls/id/606260
CERT/CC vulnerability note: VU#427972
http://www.kb.cert.org/vuls/id/427972
BugTraq ID: 21668
http://www.securityfocus.com/bid/21668
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11691
http://www.vupen.com/english/advisories/2006/5068
http://www.vupen.com/english/advisories/2007/1463
http://www.vupen.com/english/advisories/2008/0083
http://securitytracker.com/id?1017398
http://securitytracker.com/id?1017405
http://securitytracker.com/id?1017406
http://secunia.com/advisories/23433
http://secunia.com/advisories/23439
http://secunia.com/advisories/23440
http://secunia.com/advisories/23282
http://secunia.com/advisories/23420
http://secunia.com/advisories/23422
http://secunia.com/advisories/23468
http://secunia.com/advisories/23514
http://secunia.com/advisories/23589
http://secunia.com/advisories/23601
http://secunia.com/advisories/23545
http://secunia.com/advisories/23591
http://secunia.com/advisories/23598
http://secunia.com/advisories/23614
http://secunia.com/advisories/23618
http://secunia.com/advisories/23692
http://secunia.com/advisories/23672
http://secunia.com/advisories/23988
http://secunia.com/advisories/24078
http://secunia.com/advisories/24390
http://secunia.com/advisories/24948
Common Vulnerability Exposure (CVE) ID: CVE-2006-6498
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102955-1
CERT/CC vulnerability note: VU#447772
http://www.kb.cert.org/vuls/id/447772
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10661
http://www.vupen.com/english/advisories/2007/2106
http://secunia.com/advisories/25556
Common Vulnerability Exposure (CVE) ID: CVE-2006-6501
CERT/CC vulnerability note: VU#263412
http://www.kb.cert.org/vuls/id/263412
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9746
http://securitytracker.com/id?1017403
http://securitytracker.com/id?1017404
http://securitytracker.com/id?1017407
Common Vulnerability Exposure (CVE) ID: CVE-2006-6502
CERT/CC vulnerability note: VU#428500
http://www.kb.cert.org/vuls/id/428500
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9626
http://securitytracker.com/id?1017411
http://securitytracker.com/id?1017412
http://securitytracker.com/id?1017413
Common Vulnerability Exposure (CVE) ID: CVE-2006-6503
CERT/CC vulnerability note: VU#405092
http://www.kb.cert.org/vuls/id/405092
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10895
http://securitytracker.com/id?1017414
http://securitytracker.com/id?1017415
http://securitytracker.com/id?1017416
Common Vulnerability Exposure (CVE) ID: CVE-2006-6504
Bugtraq: 20061220 ZDI-06-051: Mozilla Firefox SVG Processing Remote Code Execution Vulnerability (Google Search)
http://www.securityfocus.com/archive/1/archive/1/454939/100/0/threaded
http://www.zerodayinitiative.com/advisories/ZDI-06-051.html
CERT/CC vulnerability note: VU#928956
http://www.kb.cert.org/vuls/id/928956
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11077
http://securitytracker.com/id?1017417
http://securitytracker.com/id?1017418
Common Vulnerability Exposure (CVE) ID: CVE-2006-6505
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102800-1
CERT/CC vulnerability note: VU#887332
http://www.kb.cert.org/vuls/id/887332
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11565
http://www.vupen.com/english/advisories/2007/0573
http://securitytracker.com/id?1017419
http://securitytracker.com/id?1017420
http://secunia.com/advisories/24108
CopyrightCopyright (c) 2006 E-Soft Inc. http://www.securityspace.com

Esta es sólo una de 39212 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.

Registro de Nuevo Usuario
Email:
Usuario:
Contraseña:
Envíeme por email sus boletines mensuales, informándome los últimos servicios, mejoras y encuestas.
Por favor envíeme por email un anuncio de prueba de vulnerabilidades siempre que se agregue una nueva prueba.
   Privacidad
Ingreso de Usuario Registrado
 
Usuario:   
Contraseña:  

 ¿Olvidó su usuario o contraseña??
Email/ID de Usario:




Principal | Acerca de Nosotros | Contáctenos | Programas de Asociado | Privacidad | Listas de Correo | Abuso
Auditorías de Seguridad | DNS Administrado | Monitoreo de Red | Analizador de Sitio | Informes de Investigación de Internet
Prueba de Web | Whois

© 1998-2014 E-Soft Inc. Todos los derechos reservados.