Search 219043 CVE descriptions
and 99761 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:
Category:Red Hat Local Security Checks
Title:RedHat Security Advisory RHSA-2006:0759

The remote host is missing updates announced in
advisory RHSA-2006:0759.

SeaMonkey is an open source Web browser, advanced email and newsgroup
client, IRC chat client, and HTML editor.

Several flaws were found in the way SeaMonkey processes certain malformed
Javascript code. A malicious web page could cause the execution of
Javascript code in such a way that could cause SeaMonkey to crash or
execute arbitrary code as the user running SeaMonkey. (CVE-2006-6498,
CVE-2006-6501, CVE-2006-6502, CVE-2006-6503, CVE-2006-6504)

Several flaws were found in the way SeaMonkey renders web pages. A
malicious web page could cause the browser to crash or possibly execute
arbitrary code as the user running SeaMonkey. (CVE-2006-6497)

A heap based buffer overflow flaw was found in the way SeaMonkey Mail
parses the Content-Type mail header. A malicious mail message could cause
the SeaMonkey Mail client to crash or possibly execute arbitrary code as
the user running SeaMonkey Mail. (CVE-2006-6505)

Users of SeaMonkey are advised to upgrade to these erratum packages, which
contain SeaMonkey version 1.0.7 that corrects these issues.

Please note that this update is available via
Red Hat Network. To use Red Hat Network, launch the Red
Hat Update Agent with the following command: up2date

Risk factor : Critical

CVSS Score:

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2006-6497
BugTraq ID: 21668
Bugtraq: 20061222 rPSA-2006-0234-1 firefox (Google Search)
Bugtraq: 20070102 rPSA-2006-0234-2 firefox thunderbird (Google Search)
Cert/CC Advisory: TA06-354A
CERT/CC vulnerability note: VU#427972
CERT/CC vulnerability note: VU#606260
Debian Security Information: DSA-1253 (Google Search)
Debian Security Information: DSA-1258 (Google Search)
Debian Security Information: DSA-1265 (Google Search)
HPdes Security Advisory: HPSBUX02153
HPdes Security Advisory: SSRT061181
RedHat Security Advisories: RHSA-2006:0758
RedHat Security Advisories: RHSA-2006:0759
RedHat Security Advisories: RHSA-2006:0760
SGI Security Advisory: 20061202-01-P
SuSE Security Announcement: SUSE-SA:2006:080 (Google Search)
SuSE Security Announcement: SUSE-SA:2007:006 (Google Search)
Common Vulnerability Exposure (CVE) ID: CVE-2006-6498
CERT/CC vulnerability note: VU#447772
Common Vulnerability Exposure (CVE) ID: CVE-2006-6501
CERT/CC vulnerability note: VU#263412
Common Vulnerability Exposure (CVE) ID: CVE-2006-6502
CERT/CC vulnerability note: VU#428500
Common Vulnerability Exposure (CVE) ID: CVE-2006-6503
CERT/CC vulnerability note: VU#405092
Common Vulnerability Exposure (CVE) ID: CVE-2006-6504
Bugtraq: 20061220 ZDI-06-051: Mozilla Firefox SVG Processing Remote Code Execution Vulnerability (Google Search)
CERT/CC vulnerability note: VU#928956
Common Vulnerability Exposure (CVE) ID: CVE-2006-6505
CERT/CC vulnerability note: VU#887332
CopyrightCopyright (c) 2006 E-Soft Inc.

This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.

© 1998-2021 E-Soft Inc. All rights reserved.