Rapid7 Vulnerability & Exploit Database

RHSA-2011:1244: seamonkey security update

Back to Search

RHSA-2011:1244: seamonkey security update

Severity
4
CVSS
(AV:L/AC:M/Au:N/C:P/I:P/A:P)
Published
08/31/2011
Created
07/25/2018
Added
09/07/2011
Modified
07/04/2017

Description

SeaMonkey is an open source web browser, email and newsgroup client, IRCchat client, and HTML editor.It was found that a Certificate Authority (CA) issued a fraudulent HTTPScertificate. This update renders any HTTPS certificates signed by thatCA as untrusted, except for a select few. The now untrusted certificatesthat were issued before July 1, 2011 can be manually re-enabled and usedagain at your own risk in SeaMonkey; however, affected certificates issuedafter this date cannot be re-enabled or used. (BZ#734316)All SeaMonkey users should upgrade to these updated packages, which correctthis issue. After installing the update, SeaMonkey must be restarted forthe changes to take effect.

Solution(s)

  • redhat-upgrade-seamonkey
  • redhat-upgrade-seamonkey-chat
  • redhat-upgrade-seamonkey-devel
  • redhat-upgrade-seamonkey-dom-inspector
  • redhat-upgrade-seamonkey-js-debugger
  • redhat-upgrade-seamonkey-mail

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;