English | Deutsch | Español | Português
 UserID:
 Passwd:
new user
 About:   Dedicated  | Advanced  | Standard  | Recurring  | No Risk  | Desktop  | Basic  | Single  | Security Seal  | FAQ
  Price/Feature Summary  | Order  | New Vulnerabilities  | Confidentiality  | Vulnerability Search
 Vulnerability   
Search   
    Search 75516 CVE descriptions
and 39786 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.57124
Category:Red Hat Local Security Checks
Title:RedHat Security Advisory RHSA-2006:0578
Summary:Redhat Security Advisory RHSA-2006:0578
Description:
The remote host is missing updates announced in
advisory RHSA-2006:0578.

SeaMonkey is an open source Web browser, advanced email and newsgroup
client, IRC chat client, and HTML editor.

The Mozilla Foundation has discontinued support for the Mozilla Suite. This
update deprecates the Mozilla Suite in Red Hat Enterprise Linux 3 in favor
of the supported SeaMonkey Suite.

This update also resolves a number of outstanding Mozilla security issues.
Please visit the referenced security advisories for details.

Users of Mozilla are advised to upgrade to this update, which contains
SeaMonkey version 1.0.2 that is not vulnerable to these issues.

Solution:
Please note that this update is available via
Red Hat Network. To use Red Hat Network, launch the Red
Hat Update Agent with the following command: up2date

http://rhn.redhat.com/errata/RHSA-2006-0578.html
http://www.redhat.com/security/updates/classification/#critical

Risk factor : Critical
Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2006-2779
Bugtraq: 20060602 rPSA-2006-0091-1 firefox thunderbird (Google Search)
http://www.securityfocus.com/archive/1/archive/1/435795/100/0/threaded
Debian Security Information: DSA-1118 (Google Search)
http://www.debian.org/security/2006/dsa-1118
Debian Security Information: DSA-1120 (Google Search)
http://www.debian.org/security/2006/dsa-1120
Debian Security Information: DSA-1134 (Google Search)
http://www.debian.org/security/2006/dsa-1134
Debian Security Information: DSA-1159 (Google Search)
http://www.debian.org/security/2006/dsa-1159
Debian Security Information: DSA-1160 (Google Search)
http://www.debian.org/security/2006/dsa-1160
http://www.gentoo.org/security/en/glsa/glsa-200606-12.xml
http://www.gentoo.org/security/en/glsa/glsa-200606-21.xml
HPdes Security Advisory: HPSBUX02153
http://www.securityfocus.com/archive/1/archive/1/446658/100/200/threaded
HPdes Security Advisory: SSRT061181
HPdes Security Advisory: HPSBUX02156
http://www.securityfocus.com/archive/1/archive/1/446657/100/200/threaded
HPdes Security Advisory: SSRT061236
http://www.mandriva.com/security/advisories?name=MDKSA-2006:143
http://www.mandriva.com/security/advisories?name=MDKSA-2006:145
http://www.mandriva.com/security/advisories?name=MDKSA-2006:146
http://www.redhat.com/support/errata/RHSA-2006-0578.html
http://www.redhat.com/support/errata/RHSA-2006-0610.html
http://www.redhat.com/support/errata/RHSA-2006-0611.html
RedHat Security Advisories: RHSA-2006:0609
http://rhn.redhat.com/errata/RHSA-2006-0609.html
http://www.redhat.com/support/errata/RHSA-2006-0594.html
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102943-1
http://sunsolve.sun.com/search/document.do?assetkey=1-66-200387-1
SuSE Security Announcement: SUSE-SA:2006:035 (Google Search)
http://www.novell.com/linux/security/advisories/2006_35_mozilla.html
http://www.ubuntulinux.org/support/documentation/usn/usn-296-1
http://www.ubuntulinux.org/support/documentation/usn/usn-297-1
http://www.ubuntulinux.org/support/documentation/usn/usn-296-2
http://www.ubuntulinux.org/support/documentation/usn/usn-297-3
http://www.ubuntulinux.org/support/documentation/usn/usn-323-1
CERT/CC vulnerability note: VU#466673
http://www.kb.cert.org/vuls/id/466673
Cert/CC Advisory: TA06-153A
http://www.us-cert.gov/cas/techalerts/TA06-153A.html
BugTraq ID: 18228
http://www.securityfocus.com/bid/18228
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9762
http://www.vupen.com/english/advisories/2006/2106
http://www.vupen.com/english/advisories/2006/3748
http://www.vupen.com/english/advisories/2006/3749
http://www.vupen.com/english/advisories/2007/3488
http://www.vupen.com/english/advisories/2008/0083
http://securitytracker.com/id?1016202
http://securitytracker.com/id?1016214
http://secunia.com/advisories/20376
http://secunia.com/advisories/20382
http://secunia.com/advisories/20561
http://secunia.com/advisories/20709
http://secunia.com/advisories/21134
http://secunia.com/advisories/21183
http://secunia.com/advisories/21176
http://secunia.com/advisories/21178
http://secunia.com/advisories/21188
http://secunia.com/advisories/21210
http://secunia.com/advisories/21269
http://secunia.com/advisories/21270
http://secunia.com/advisories/21336
http://secunia.com/advisories/21324
http://secunia.com/advisories/21532
http://secunia.com/advisories/21607
http://secunia.com/advisories/21631
http://secunia.com/advisories/21654
http://secunia.com/advisories/21634
http://secunia.com/advisories/22065
http://secunia.com/advisories/22066
http://secunia.com/advisories/27216
XForce ISS Database: mozilla-browserengine-memory-corruption(26843)
http://xforce.iss.net/xforce/xfdb/26843
Common Vulnerability Exposure (CVE) ID: CVE-2006-2780
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11305
Common Vulnerability Exposure (CVE) ID: CVE-2006-2781
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10247
http://secunia.com/advisories/20394
XForce ISS Database: mozilla-vcard-doublefree-memory-corruption(26850)
http://xforce.iss.net/xforce/xfdb/26850
Common Vulnerability Exposure (CVE) ID: CVE-2006-2783
http://lists.apple.com/archives/security-announce/2008//Jul/msg00001.html
http://lists.apple.com/archives/security-announce/2009/jun/msg00002.html
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10772
http://secunia.com/advisories/35379
http://www.vupen.com/english/advisories/2008/2094/references
http://secunia.com/advisories/31074
http://www.vupen.com/english/advisories/2009/1522
XForce ISS Database: mozilla-bom-utf8-xss(26852)
http://xforce.iss.net/xforce/xfdb/26852
Common Vulnerability Exposure (CVE) ID: CVE-2006-2782
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10429
XForce ISS Database: mozilla-firefox-textbox-file-access(26851)
http://xforce.iss.net/xforce/xfdb/26851
Common Vulnerability Exposure (CVE) ID: CVE-2006-2778
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102763-1
CERT/CC vulnerability note: VU#421529
http://www.kb.cert.org/vuls/id/421529
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9703
http://www.vupen.com/english/advisories/2007/0058
XForce ISS Database: mozilla-crypto-signtext-bo(26849)
http://xforce.iss.net/xforce/xfdb/26849
Common Vulnerability Exposure (CVE) ID: CVE-2006-2776
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102800-1
CERT/CC vulnerability note: VU#575969
http://www.kb.cert.org/vuls/id/575969
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9849
http://www.vupen.com/english/advisories/2007/0573
http://secunia.com/advisories/24108
XForce ISS Database: mozilla-contentdefined-code-execution(26848)
http://xforce.iss.net/xforce/xfdb/26848
Common Vulnerability Exposure (CVE) ID: CVE-2006-2784
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9768
XForce ISS Database: mozilla-pluginspage-code-execution(26847)
http://xforce.iss.net/xforce/xfdb/26847
Common Vulnerability Exposure (CVE) ID: CVE-2006-2785
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10545
XForce ISS Database: mozilla-viewimage-xss(26845)
http://xforce.iss.net/xforce/xfdb/26845
Common Vulnerability Exposure (CVE) ID: CVE-2006-2786
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9966
XForce ISS Database: mozilla-http-response-smuggling(26844)
http://xforce.iss.net/xforce/xfdb/26844
Common Vulnerability Exposure (CVE) ID: CVE-2006-2787
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9491
XForce ISS Database: mozilla-valueof-sandbox-bypass(26842)
http://xforce.iss.net/xforce/xfdb/26842
Common Vulnerability Exposure (CVE) ID: CVE-2006-2788
Debian Security Information: DSA-1191 (Google Search)
http://www.us.debian.org/security/2006/dsa-1191
Debian Security Information: DSA-1192 (Google Search)
http://www.debian.org/security/2006/dsa-1192
Debian Security Information: DSA-1210 (Google Search)
http://www.debian.org/security/2006/dsa-1210
http://www.ubuntu.com/usn/usn-361-1
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11065
http://secunia.com/advisories/22247
http://secunia.com/advisories/22299
http://secunia.com/advisories/22342
http://secunia.com/advisories/22849
CopyrightCopyright (c) 2006 E-Soft Inc. http://www.securityspace.com

This is only one of 39786 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.

New User Registration
Email:
UserID:
Passwd:
Please email me your monthly newsletters, informing the latest services, improvements & surveys.
Please email me a vulnerability test announcement whenever a new test is added.
   Privacy
Registered User Login
 
UserID:   
Passwd:  

 Forgot userid or passwd?
Email/Userid:




Home | About Us | Contact Us | Partner Programs | Privacy | Mailing Lists | Abuse
Security Audits | Managed DNS | Network Monitoring | Site Analyzer | Internet Research Reports
Web Probe | Whois

© 1998-2014 E-Soft Inc. All rights reserved.