RHEL 2.1 / 3 / 4 : seamonkey (RHSA-2008:0208)

High Nessus Plugin ID 31695

Synopsis

The remote Red Hat host is missing one or more security updates.

Description

Updated SeaMonkey packages that fix several security issues are now available for Red Hat Enterprise Linux 2.1, 3, and 4.

This update has been rated as having critical security impact by the Red Hat Security Response Team.

SeaMonkey is an open source Web browser, advanced email and newsgroup client, IRC chat client, and HTML editor.

Several flaws were found in the processing of some malformed web content. A web page containing such malicious content could cause SeaMonkey to crash or, potentially, execute arbitrary code as the user running SeaMonkey. (CVE-2008-1233, CVE-2008-1235, CVE-2008-1236, CVE-2008-1237)

Several flaws were found in the display of malformed web content. A web page containing specially crafted content could, potentially, trick a SeaMonkey user into surrendering sensitive information.
(CVE-2008-1234, CVE-2008-1238, CVE-2008-1241)

All SeaMonkey users should upgrade to these updated packages, which contain backported patches to resolve these issues.

Solution

Update the affected packages.

See Also

https://access.redhat.com/security/cve/cve-2008-0414

https://access.redhat.com/security/cve/cve-2008-1233

https://access.redhat.com/security/cve/cve-2008-1234

https://access.redhat.com/security/cve/cve-2008-1235

https://access.redhat.com/security/cve/cve-2008-1236

https://access.redhat.com/security/cve/cve-2008-1237

https://access.redhat.com/security/cve/cve-2008-1238

https://access.redhat.com/security/cve/cve-2008-1241

https://access.redhat.com/errata/RHSA-2008:0208

Plugin Details

Severity: High

ID: 31695

File Name: redhat-RHSA-2008-0208.nasl

Version: 1.24

Type: local

Agent: unix

Published: 2008/03/28

Updated: 2019/09/17

Dependencies: 12634

Risk Information

Risk Factor: High

CVSS v2.0

Base Score: 9.3

Temporal Score: 6.9

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:redhat:enterprise_linux:seamonkey, p-cpe:/a:redhat:enterprise_linux:seamonkey-chat, p-cpe:/a:redhat:enterprise_linux:seamonkey-devel, p-cpe:/a:redhat:enterprise_linux:seamonkey-dom-inspector, p-cpe:/a:redhat:enterprise_linux:seamonkey-js-debugger, p-cpe:/a:redhat:enterprise_linux:seamonkey-mail, p-cpe:/a:redhat:enterprise_linux:seamonkey-nspr, p-cpe:/a:redhat:enterprise_linux:seamonkey-nspr-devel, p-cpe:/a:redhat:enterprise_linux:seamonkey-nss, p-cpe:/a:redhat:enterprise_linux:seamonkey-nss-devel, cpe:/o:redhat:enterprise_linux:2.1, cpe:/o:redhat:enterprise_linux:3, cpe:/o:redhat:enterprise_linux:4, cpe:/o:redhat:enterprise_linux:4.6

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2008/03/27

Vulnerability Publication Date: 2008/02/08

Reference Information

CVE: CVE-2008-0414, CVE-2008-1233, CVE-2008-1234, CVE-2008-1235, CVE-2008-1236, CVE-2008-1237, CVE-2008-1238, CVE-2008-1241

BID: 28448

RHSA: 2008:0208

CWE: 20, 59, 79, 94, 287, 399