Rapid7 Vulnerability & Exploit Database

RHSA-2011:0473: seamonkey security update

Back to Search

RHSA-2011:0473: seamonkey security update

Severity
10
CVSS
(AV:N/AC:L/Au:N/C:C/I:C/A:C)
Published
05/07/2011
Created
07/25/2018
Added
05/12/2011
Modified
07/04/2017

Description

SeaMonkey is an open source web browser, email and newsgroup client, IRCchat client, and HTML editor.Several flaws were found in the processing of malformed web content. A webpage containing malicious content could possibly lead to arbitrary codeexecution with the privileges of the user running SeaMonkey.(CVE-2011-0080)An arbitrary memory write flaw was found in the way SeaMonkey handledout-of-memory conditions. If all memory was consumed when a user visited amalicious web page, it could possibly lead to arbitrary code executionwith the privileges of the user running SeaMonkey. (CVE-2011-0078)An integer overflow flaw was found in the way SeaMonkey handled the HTMLframeset tag. A web page with a frameset tag containing large values forthe "rows" and "cols" attributes could trigger this flaw, possibly leadingto arbitrary code execution with the privileges of the user runningSeaMonkey. (CVE-2011-0077)A flaw was found in the way SeaMonkey handled the HTML iframe tag. A webpage with an iframe tag containing a specially-crafted source address couldtrigger this flaw, possibly leading to arbitrary code execution with theprivileges of the user running SeaMonkey. (CVE-2011-0075)A flaw was found in the way SeaMonkey displayed multiple marquee elements.A malformed HTML document could cause SeaMonkey to execute arbitrary codewith the privileges of the user running SeaMonkey. (CVE-2011-0074)A flaw was found in the way SeaMonkey handled the nsTreeSelection element.Malformed content could cause SeaMonkey to execute arbitrary code with theprivileges of the user running SeaMonkey. (CVE-2011-0073)A use-after-free flaw was found in the way SeaMonkey appended frame andiframe elements to a DOM tree when the NoScript add-on was enabled.Malicious HTML content could cause SeaMonkey to execute arbitrary code withthe privileges of the user running SeaMonkey. (CVE-2011-0072)All SeaMonkey users should upgrade to these updated packages, which correctthese issues. After installing the update, SeaMonkey must be restarted forthe changes to take effect.

Solution(s)

  • redhat-upgrade-seamonkey
  • redhat-upgrade-seamonkey-chat
  • redhat-upgrade-seamonkey-devel
  • redhat-upgrade-seamonkey-dom-inspector
  • redhat-upgrade-seamonkey-js-debugger
  • redhat-upgrade-seamonkey-mail

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;