Scientific Linux Security Update : seamonkey on SL3.x, SL4.x i386/x86_64

high Nessus Plugin ID 60879


The remote Scientific Linux host is missing one or more security updates.


A race condition flaw was found in the way SeaMonkey handled Document Object Model (DOM) element properties. A web page containing malicious content could cause SeaMonkey to crash or, potentially, execute arbitrary code with the privileges of the user running SeaMonkey.

After installing the update, SeaMonkey must be restarted for the changes to take effect

Note1: The Upstream Vendor has released this update. We feel that we should provide it to those few SL3 machines that are left. Note2: The Upstream Vendor ends support for their release in 3 days. So we expect this to be the last update for SL3.


Update the affected packages.

See Also

Plugin Details

Severity: High

ID: 60879

File Name: sl_20101027_seamonkey_on_SL3_x.nasl

Version: 1.6

Type: local

Agent: unix

Published: 8/1/2012

Updated: 1/14/2021

Supported Sensors: Nessus Agent, Nessus

Risk Information


Risk Factor: Critical

Score: 9.7


Risk Factor: High

Base Score: 9.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: x-cpe:/o:fermilab:scientific_linux

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/RedHat/release, Host/RedHat/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 10/27/2010

Exploitable With


Metasploit (Mozilla Firefox Interleaved document.write/appendChild Memory Corruption)

Reference Information

CVE: CVE-2010-3765