|Category:||Red Hat Local Security Checks|
|Title:||RedHat Update for seamonkey RHSA-2012:0141-01|
|Summary:||The remote host is missing an update for the 'seamonkey'; package(s) announced via the referenced advisory.|
The remote host is missing an update for the 'seamonkey'
package(s) announced via the referenced advisory.
SeaMonkey is an open source web browser, e-mail and newsgroup client, IRC
chat client, and HTML editor.
A heap-based buffer overflow flaw was found in the way SeaMonkey handled
PNG (Portable Network Graphics) images. A web page containing a malicious
PNG image could cause SeaMonkey to crash or, possibly, execute arbitrary
code with the privileges of the user running SeaMonkey.
All SeaMonkey users should upgrade to these updated packages, which correct
this issue. After installing the update, SeaMonkey must be restarted for
the changes to take effect.
seamonkey on Red Hat Enterprise Linux AS version 4,
Red Hat Enterprise Linux ES version 4,
Red Hat Enterprise Linux WS version 4
Please Install the Updated Packages.
Common Vulnerability Exposure (CVE) ID: CVE-2011-3026|
SuSE Security Announcement: SUSE-SU-2012:0303 (Google Search)
SuSE Security Announcement: openSUSE-SU-2012:0297 (Google Search)
|Copyright||Copyright (C) 2012 Greenbone Networks GmbH|
|This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.