Fedora 13 : seamonkey-2.0.5-1.fc13 (2010-10363)

Critical Nessus Plugin ID 47226

Synopsis

The remote Fedora host is missing a security update.

Description

Update to new upstream SeaMonkey version 2.0.5, fixing multiple security issues detailed in the upstream advisories:
http://www.mozilla.org/security/known- vulnerabilities/seamonkey20.html#seamonkey2.0.5 CVE-2010-1121 CVE-2010-1200 CVE-2010-1201 CVE-2010-1202 CVE-2010-1203 CVE-2010-0183 CVE-2010-1198 CVE-2010-1196 CVE-2010-1199 CVE-2010-1125 CVE-2010-1197 CVE-2008-5913

Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.

Solution

Update the affected seamonkey package.

See Also

https://www.mozilla.org/en-US/security/known-

https://bugzilla.redhat.com/show_bug.cgi?id=480938

https://bugzilla.redhat.com/show_bug.cgi?id=577029

https://bugzilla.redhat.com/show_bug.cgi?id=577584

https://bugzilla.redhat.com/show_bug.cgi?id=590804

https://bugzilla.redhat.com/show_bug.cgi?id=590810

https://bugzilla.redhat.com/show_bug.cgi?id=590816

https://bugzilla.redhat.com/show_bug.cgi?id=590822

https://bugzilla.redhat.com/show_bug.cgi?id=590828

https://bugzilla.redhat.com/show_bug.cgi?id=590830

https://bugzilla.redhat.com/show_bug.cgi?id=590833

https://bugzilla.redhat.com/show_bug.cgi?id=590850

http://www.nessus.org/u?5cc2a5d7

Plugin Details

Severity: Critical

ID: 47226

File Name: fedora_2010-10363.nasl

Version: 1.13

Type: local

Agent: unix

Published: 2010/07/01

Updated: 2019/08/02

Dependencies: 12634

Risk Information

Risk Factor: Critical

CVSS v2.0

Base Score: 10

Temporal Score: 7.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:POC/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:fedoraproject:fedora:seamonkey, cpe:/o:fedoraproject:fedora:13

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2010/06/24

Reference Information

CVE: CVE-2008-5913, CVE-2010-0183, CVE-2010-1121, CVE-2010-1125, CVE-2010-1196, CVE-2010-1197, CVE-2010-1198, CVE-2010-1199, CVE-2010-1200, CVE-2010-1202, CVE-2010-1203

FEDORA: 2010-10363