Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.64334
Categoría:Red Hat Local Security Checks
Título:RedHat Security Advisory RHSA-2009:1134
Resumen:The remote host is missing updates announced in;advisory RHSA-2009:1134.;;SeaMonkey is an open source Web browser, email and newsgroup client, IRC;chat client, and HTML editor.;;A flaw was found in the way that SeaMonkey parsed malformed HTML mail;messages. If a user opened a specially-crafted HTML mail message, it could;cause SeaMonkey to crash or, possibly, to execute arbitrary code as the;user running SeaMonkey. (CVE-2009-2210);;All SeaMonkey users should upgrade to these updated packages, which correct;this issue. After installing the update, SeaMonkey must be restarted for;the changes to take effect.
Descripción:Summary:
The remote host is missing updates announced in
advisory RHSA-2009:1134.

SeaMonkey is an open source Web browser, email and newsgroup client, IRC
chat client, and HTML editor.

A flaw was found in the way that SeaMonkey parsed malformed HTML mail
messages. If a user opened a specially-crafted HTML mail message, it could
cause SeaMonkey to crash or, possibly, to execute arbitrary code as the
user running SeaMonkey. (CVE-2009-2210)

All SeaMonkey users should upgrade to these updated packages, which correct
this issue. After installing the update, SeaMonkey must be restarted for
the changes to take effect.

Solution:
Please note that this update is available via
Red Hat Network. To use Red Hat Network, launch the Red
Hat Update Agent with the following command: up2date

CVSS Score:
9.3

CVSS Vector:
AV:N/AC:M/Au:N/C:C/I:C/A:C

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2009-2210
BugTraq ID: 35461
http://www.securityfocus.com/bid/35461
Debian Security Information: DSA-1830 (Google Search)
http://www.debian.org/security/2009/dsa-1830
https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00444.html
https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00504.html
http://www.mandriva.com/security/advisories?name=MDVSA-2009:141
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9994
http://www.redhat.com/support/errata/RHSA-2009-1134.html
http://securitytracker.com/id?1022433
http://secunia.com/advisories/35561
http://secunia.com/advisories/35602
http://secunia.com/advisories/35633
http://secunia.com/advisories/35882
http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.425408
http://www.slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.454275
XForce ISS Database: mozilla-multipart-alternative-code-exec(51315)
https://exchange.xforce.ibmcloud.com/vulnerabilities/51315
CopyrightCopyright (C) 2009 E-Soft Inc.

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.