Fedora 8 : seamonkey-1.1.10-1.fc8 (2008-6196)

This script is Copyright (C) 2008-2016 Tenable Network Security, Inc.


Synopsis :

The remote Fedora host is missing a security update.

Description :

Updated seamonkey packages that fix several security issues are now
available for Fedora 8. SeaMonkey is an all-in-one Internet
application suite. It includes a browser, mail/news client, IRC
client, JavaScript debugger, and a tool to inspect the DOM for web
pages. It is derived from the application formerly known as Mozilla
Application Suite. Multiple flaws were found in the processing of
malformed JavaScript content. A web page containing such malicious
content could cause Firefox to crash or, potentially, execute
arbitrary code as the user running Firefox. (CVE-2008-2801,
CVE-2008-2802, CVE-2008-2803) Several flaws were found in the
processing of malformed web content. A web page containing malicious
content could cause Firefox to crash or, potentially, execute
arbitrary code as the user running Firefox. (CVE-2008-2798,
CVE-2008-2799, CVE-2008-2811) Several flaws were found in the way
malformed web content was displayed. A web page containing specially
crafted content could potentially trick a Firefox user into
surrendering sensitive information. (CVE-2008-2800) Two local file
disclosure flaws were found in Firefox. A web page containing
malicious content could cause Firefox to reveal the contents of a
local file to a remote attacker. (CVE-2008-2805, CVE-2008-2810) A flaw
was found in the way a malformed .properties file was processed by
Firefox. A malicious extension could read uninitialized memory,
possibly leaking sensitive data to the extension. (CVE-2008-2807) A
flaw was found in the way Firefox escaped a listing of local file
names. If a user could be tricked into listing a local directory
containing malicious file names, arbitrary JavaScript could be run
with the permissions of the user running Firefox. (CVE-2008-2808) A
flaw was found in the way Firefox displayed information about
self-signed certificates. It was possible for a self-signed
certificate to contain multiple alternate name entries, which were not
all displayed to the user, allowing them to mistakenly extend trust to
an unknown site. (CVE-2008-2809) Updated packages update SeaMonkey to
upstream version 1.1.10 to address these flaws:
http://www.mozilla.org/projects/security/known-
vulnerabilities.html#seamonkey1.1.10

Note that Tenable Network Security has extracted the preceding
description block directly from the Fedora security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.

See also :

http://www.mozilla.org/projects/security/known-
https://bugzilla.redhat.com/show_bug.cgi?id=452597
https://bugzilla.redhat.com/show_bug.cgi?id=452598
https://bugzilla.redhat.com/show_bug.cgi?id=452599
https://bugzilla.redhat.com/show_bug.cgi?id=452600
https://bugzilla.redhat.com/show_bug.cgi?id=452602
https://bugzilla.redhat.com/show_bug.cgi?id=452604
https://bugzilla.redhat.com/show_bug.cgi?id=452605
https://bugzilla.redhat.com/show_bug.cgi?id=452709
https://bugzilla.redhat.com/show_bug.cgi?id=452710
https://bugzilla.redhat.com/show_bug.cgi?id=452711
https://bugzilla.redhat.com/show_bug.cgi?id=452712
https://bugzilla.redhat.com/show_bug.cgi?id=453007
http://www.nessus.org/u?6bbca527

Solution :

Update the affected seamonkey package.

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 8.7
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : true

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now