Subject: | |
From: | |
Reply To: | |
Date: | Thu, 10 Sep 2009 15:57:31 -0500 |
Content-Type: | text/plain |
Parts/Attachments: |
|
|
Synopsis: Critical: seamonkey security update
Issue date: 2009-09-09
CVE Names: CVE-2009-2408 CVE-2009-2409 CVE-2009-2654
CVE-2009-3072 CVE-2009-3075 CVE-2009-3076
CVE-2009-3077
CVE-2009-2409 deprecate MD2 in SSL cert validation (Kaminsky)
CVE-2009-2408 firefox/nss: doesn't handle NULL in Common Name properly
CVE-2009-2654 firefox: URL bar spoofing vulnerability
CVE-2009-3072 Firefox 3.5.3 3.0.14 browser engine crashes
CVE-2009-3075 Firefox 3.5.2 3.0.14 JavaScript engine crashes
CVE-2009-3076 Firefox 3.0.14 Insufficient warning for PKCS11 module
installation and removal
CVE-2009-3077 Firefox 3.5.3 3.0.14 TreeColumns dangling pointer
vulnerability
Several flaws were found in the processing of malformed web content. A
web page containing malicious content could cause SeaMonkey to crash or,
potentially, execute arbitrary code with the privileges of the user
running SeaMonkey. (CVE-2009-3072, CVE-2009-3075)
A use-after-free flaw was found in SeaMonkey. An attacker could use this
flaw to crash SeaMonkey or, potentially, execute arbitrary code with the
privileges of the user running SeaMonkey. (CVE-2009-3077)
Dan Kaminsky discovered flaws in the way browsers such as SeaMonkey
handle NULL characters in a certificate. If an attacker is able to get a
carefully-crafted certificate signed by a Certificate Authority trusted
by SeaMonkey, the attacker could use the certificate during a
man-in-the-middle attack and potentially confuse SeaMonkey into
accepting it by mistake. (CVE-2009-2408)
Descriptions in the dialogs when adding and removing PKCS #11 modules
were not informative. An attacker able to trick a user into installing a
malicious PKCS #11 module could use this flaw to install their own
Certificate Authority certificates on a user's machine, making it
possible to trick the user into believing they are viewing a trusted
site or, potentially, execute arbitrary code with the privileges of the
user running SeaMonkey. (CVE-2009-3076)
A flaw was found in the way SeaMonkey displays the address bar when
window.open() is called in a certain way. An attacker could use this
flaw to conceal a malicious URL, possibly tricking a user into believing
they are viewing a trusted site. (CVE-2009-2654)
Dan Kaminsky found that browsers still accept certificates with MD2 hash
signatures, even though MD2 is no longer considered a cryptographically
strong algorithm. This could make it easier for an attacker to create a
malicious certificate that would be treated as trusted by a browser. NSS
(provided by SeaMonkey) now disables the use of MD2 and MD4 algorithms
inside signatures by default. (CVE-2009-2409)
After installing the update, SeaMonkey must be restarted for the changes
to take effect.
SL 3.0.x
SRPMS:
seamonkey-1.0.9-0.45.el3.src.rpm
i386:
seamonkey-1.0.9-0.45.el3.i386.rpm
seamonkey-chat-1.0.9-0.45.el3.i386.rpm
seamonkey-devel-1.0.9-0.45.el3.i386.rpm
seamonkey-dom-inspector-1.0.9-0.45.el3.i386.rpm
seamonkey-js-debugger-1.0.9-0.45.el3.i386.rpm
seamonkey-mail-1.0.9-0.45.el3.i386.rpm
seamonkey-nspr-1.0.9-0.45.el3.i386.rpm
seamonkey-nspr-devel-1.0.9-0.45.el3.i386.rpm
seamonkey-nss-1.0.9-0.45.el3.i386.rpm
seamonkey-nss-devel-1.0.9-0.45.el3.i386.rpm
x86_64:
seamonkey-1.0.9-0.45.el3.i386.rpm
seamonkey-1.0.9-0.45.el3.x86_64.rpm
seamonkey-chat-1.0.9-0.45.el3.i386.rpm
seamonkey-chat-1.0.9-0.45.el3.x86_64.rpm
seamonkey-devel-1.0.9-0.45.el3.x86_64.rpm
seamonkey-dom-inspector-1.0.9-0.45.el3.i386.rpm
seamonkey-dom-inspector-1.0.9-0.45.el3.x86_64.rpm
seamonkey-js-debugger-1.0.9-0.45.el3.i386.rpm
seamonkey-js-debugger-1.0.9-0.45.el3.x86_64.rpm
seamonkey-mail-1.0.9-0.45.el3.i386.rpm
seamonkey-mail-1.0.9-0.45.el3.x86_64.rpm
seamonkey-nspr-1.0.9-0.45.el3.i386.rpm
seamonkey-nspr-1.0.9-0.45.el3.x86_64.rpm
seamonkey-nspr-devel-1.0.9-0.45.el3.x86_64.rpm
seamonkey-nss-1.0.9-0.45.el3.i386.rpm
seamonkey-nss-1.0.9-0.45.el3.x86_64.rpm
seamonkey-nss-devel-1.0.9-0.45.el3.x86_64.rpm
SL 4.x
SRPMS:
seamonkey-1.0.9-48.el4_8.src.rpm
i386:
seamonkey-1.0.9-48.el4_8.i386.rpm
seamonkey-chat-1.0.9-48.el4_8.i386.rpm
seamonkey-devel-1.0.9-48.el4_8.i386.rpm
seamonkey-dom-inspector-1.0.9-48.el4_8.i386.rpm
seamonkey-js-debugger-1.0.9-48.el4_8.i386.rpm
seamonkey-mail-1.0.9-48.el4_8.i386.rpm
x86_64:
seamonkey-1.0.9-48.el4_8.i386.rpm
seamonkey-1.0.9-48.el4_8.x86_64.rpm
seamonkey-chat-1.0.9-48.el4_8.i386.rpm
seamonkey-chat-1.0.9-48.el4_8.x86_64.rpm
seamonkey-devel-1.0.9-48.el4_8.x86_64.rpm
seamonkey-dom-inspector-1.0.9-48.el4_8.i386.rpm
seamonkey-dom-inspector-1.0.9-48.el4_8.x86_64.rpm
seamonkey-js-debugger-1.0.9-48.el4_8.i386.rpm
seamonkey-js-debugger-1.0.9-48.el4_8.x86_64.rpm
seamonkey-mail-1.0.9-48.el4_8.i386.rpm
seamonkey-mail-1.0.9-48.el4_8.x86_64.rpm
-Connie Sieh
-Troy Dawson
|
|
|