Rapid7 Vulnerability & Exploit Database

RHSA-2010:0546: seamonkey security update

Back to Search

RHSA-2010:0546: seamonkey security update



SeaMonkey is an open source web browser, email and newsgroup client, IRCchat client, and HTML editor.Several flaws were found in the processing of malformed web content. A webpage containing malicious content could cause SeaMonkey to crash or,potentially, execute arbitrary code with the privileges of the user runningSeaMonkey. (CVE-2010-1211, CVE-2010-2753, CVE-2010-1214)A memory corruption flaw was found in the way SeaMonkey decoded certain PNGimages. An attacker could create a specially-crafted PNG image that, whenopened, could cause SeaMonkey to crash or, potentially, execute arbitrarycode with the privileges of the user running SeaMonkey. (CVE-2010-1205)A same-origin policy bypass flaw was found in SeaMonkey. An attacker couldcreate a malicious web page that, when viewed by a victim, could stealprivate data from a different website the victim has loaded with SeaMonkey.(CVE-2010-2754)A flaw was found in the way SeaMonkey displayed the location bar whenvisiting a secure web page. A malicious server could use this flaw topresent data that appears to originate from a secure server, even though itdoes not. (CVE-2010-2751)All SeaMonkey users should upgrade to these updated packages, which correctthese issues. After installing the update, SeaMonkey must be restarted forthe changes to take effect.


  • redhat-upgrade-seamonkey
  • redhat-upgrade-seamonkey-chat
  • redhat-upgrade-seamonkey-devel
  • redhat-upgrade-seamonkey-dom-inspector
  • redhat-upgrade-seamonkey-js-debugger
  • redhat-upgrade-seamonkey-mail

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center