openSUSE 10 Security Update : seamonkey (seamonkey-5167)

High Nessus Plugin ID 32027


The remote openSUSE host is missing a security update.


This update brings Mozilla SeaMonkey to the level of seamonkey security update version 1.1.9

Following security problems were fixed :

- MFSA 2008-19/CVE-2008-1241: XUL popup spoofing variant (cross-tab popups)

- MFSA 2008-18/CVE-2008-1195 and CVE-2008-1240: Java socket connection to any local port via LiveConnect

- MFSA 2008-17/CVE-2007-4879: Privacy issue with SSL Client Authentication

- MFSA 2008-16/CVE-2008-1238: HTTP Referrer spoofing with malformed URLs

- MFSA 2008-15/CVE-2008-1236 and CVE-2008-1237: Crashes with evidence of memory corruption (rv:

- MFSA 2008-14/CVE-2008-1233, CVE-2008-1234, and CVE-2008-1235: JavaScript privilege escalation and arbitrary code execution.


Update the affected seamonkey packages.

Plugin Details

Severity: High

ID: 32027

File Name: suse_seamonkey-5167.nasl

Version: $Revision: 1.9 $

Type: local

Agent: unix

Published: 2008/04/22

Modified: 2016/12/27

Dependencies: 12634

Risk Information

Risk Factor: High


Base Score: 9.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:seamonkey, p-cpe:/a:novell:opensuse:seamonkey-calendar, p-cpe:/a:novell:opensuse:seamonkey-dom-inspector, p-cpe:/a:novell:opensuse:seamonkey-irc, p-cpe:/a:novell:opensuse:seamonkey-mail, p-cpe:/a:novell:opensuse:seamonkey-spellchecker, p-cpe:/a:novell:opensuse:seamonkey-venkman, cpe:/o:novell:opensuse:10.1

Required KB Items: Host/local_checks_enabled, Host/SuSE/release, Host/SuSE/rpm-list, Host/cpu

Patch Publication Date: 2008/04/10

Reference Information

CVE: CVE-2007-4879, CVE-2008-1195, CVE-2008-1233, CVE-2008-1234, CVE-2008-1235, CVE-2008-1236, CVE-2008-1237, CVE-2008-1238, CVE-2008-1240, CVE-2008-1241

CWE: 59, 79, 94, 287, 399