|Category:||Red Hat Local Security Checks|
|Title:||RedHat Security Advisory RHSA-2009:1185|
|Summary:||Redhat Security Advisory RHSA-2009:1185|
|Description:||The remote host is missing updates announced in|
SeaMonkey is an open source Web browser, email and newsgroup client, IRC
chat client, and HTML editor.
Moxie Marlinspike reported a heap overflow flaw in a regular expression
parser in the NSS library (provided by SeaMonkey) used to match common
names in certificates. A malicious website could present a
carefully-crafted certificate in such a way as to trigger the heap
overflow, leading to a crash or, possibly, arbitrary code execution with
the permissions of the user running SeaMonkey. (CVE-2009-2404)
Note: in order to exploit this issue without further user interaction, the
carefully-crafted certificate would need to be signed by a Certificate
Authority trusted by SeaMonkey, otherwise SeaMonkey presents the victim
with a warning that the certificate is untrusted. Only if the user then
accepts the certificate will the overflow take place.
All SeaMonkey users should upgrade to these updated packages, which contain
a backported patch to correct this issue. After installing the updated
packages, SeaMonkey must be restarted for the update to take effect.
Please note that this update is available via
Red Hat Network. To use Red Hat Network, launch the Red
Hat Update Agent with the following command: up2date
Common Vulnerability Exposure (CVE) ID: CVE-2009-2404|
Debian Security Information: DSA-1874 (Google Search)
RedHat Security Advisories: RHSA-2009:1185
SuSE Security Announcement: SUSE-SA:2009:048 (Google Search)
Cert/CC Advisory: TA10-103B
BugTraq ID: 35891
|Copyright||Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com|
|This is only one of 43391 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.