|Category:||Red Hat Local Security Checks|
|Title:||RedHat Update for seamonkey RHSA-2012:0084-01|
|Summary:||The remote host is missing an update for the 'seamonkey'; package(s) announced via the referenced advisory.|
The remote host is missing an update for the 'seamonkey'
package(s) announced via the referenced advisory.
SeaMonkey is an open source web browser, e-mail and newsgroup client, IRC
chat client, and HTML editor.
A flaw was found in the processing of malformed web content. A web page
containing malicious content could cause SeaMonkey to crash or,
potentially, execute arbitrary code with the privileges of the user running
A malicious script could possibly use this flaw to gain access to sensitive
information (such as a client's IP and user e-mail address, or httpOnly cookies)
that may be included in HTTP proxy error replies, generated in response
to invalid URLs using square brackets. (CVE-2011-3670)
All SeaMonkey users should upgrade to these updated packages, which correct
these issues. After installing the update, SeaMonkey must be restarted for
the changes to take effect.
seamonkey on Red Hat Enterprise Linux AS version 4,
Red Hat Enterprise Linux ES version 4,
Red Hat Enterprise Linux WS version 4
Please Install the Updated Packages.
Common Vulnerability Exposure (CVE) ID: CVE-2011-3670|
Debian Security Information: DSA-2400 (Google Search)
Debian Security Information: DSA-2402 (Google Search)
Debian Security Information: DSA-2406 (Google Search)
SuSE Security Announcement: SUSE-SU-2012:0198 (Google Search)
SuSE Security Announcement: SUSE-SU-2012:0221 (Google Search)
SuSE Security Announcement: openSUSE-SU-2012:0234 (Google Search)
Common Vulnerability Exposure (CVE) ID: CVE-2012-0442
|Copyright||Copyright (C) 2012 Greenbone Networks GmbH|
|This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.