RHEL 2.1 / 3 / 4 : seamonkey (RHSA-2008:0208)

high Nessus Plugin ID 31695

Synopsis

The remote Red Hat host is missing one or more security updates.

Description

Updated SeaMonkey packages that fix several security issues are now available for Red Hat Enterprise Linux 2.1, 3, and 4.

This update has been rated as having critical security impact by the Red Hat Security Response Team.

SeaMonkey is an open source Web browser, advanced email and newsgroup client, IRC chat client, and HTML editor.

Several flaws were found in the processing of some malformed web content. A web page containing such malicious content could cause SeaMonkey to crash or, potentially, execute arbitrary code as the user running SeaMonkey. (CVE-2008-1233, CVE-2008-1235, CVE-2008-1236, CVE-2008-1237)

Several flaws were found in the display of malformed web content. A web page containing specially crafted content could, potentially, trick a SeaMonkey user into surrendering sensitive information.
(CVE-2008-1234, CVE-2008-1238, CVE-2008-1241)

All SeaMonkey users should upgrade to these updated packages, which contain backported patches to resolve these issues.

Solution

Update the affected packages.

See Also

https://access.redhat.com/security/cve/cve-2008-0414

https://access.redhat.com/security/cve/cve-2008-1233

https://access.redhat.com/security/cve/cve-2008-1234

https://access.redhat.com/security/cve/cve-2008-1235

https://access.redhat.com/security/cve/cve-2008-1236

https://access.redhat.com/security/cve/cve-2008-1237

https://access.redhat.com/security/cve/cve-2008-1238

https://access.redhat.com/security/cve/cve-2008-1241

https://access.redhat.com/errata/RHSA-2008:0208

Plugin Details

Severity: High

ID: 31695

File Name: redhat-RHSA-2008-0208.nasl

Version: 1.27

Type: local

Agent: unix

Published: 3/28/2008

Updated: 1/14/2021

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 6.9

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:redhat:enterprise_linux:seamonkey, p-cpe:/a:redhat:enterprise_linux:seamonkey-chat, p-cpe:/a:redhat:enterprise_linux:seamonkey-devel, p-cpe:/a:redhat:enterprise_linux:seamonkey-dom-inspector, p-cpe:/a:redhat:enterprise_linux:seamonkey-js-debugger, p-cpe:/a:redhat:enterprise_linux:seamonkey-mail, p-cpe:/a:redhat:enterprise_linux:seamonkey-nspr, p-cpe:/a:redhat:enterprise_linux:seamonkey-nspr-devel, p-cpe:/a:redhat:enterprise_linux:seamonkey-nss, p-cpe:/a:redhat:enterprise_linux:seamonkey-nss-devel, cpe:/o:redhat:enterprise_linux:2.1, cpe:/o:redhat:enterprise_linux:3, cpe:/o:redhat:enterprise_linux:4, cpe:/o:redhat:enterprise_linux:4.6

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Exploit Ease: No known exploits are available

Patch Publication Date: 3/27/2008

Vulnerability Publication Date: 2/8/2008

Reference Information

CVE: CVE-2008-0414, CVE-2008-1233, CVE-2008-1234, CVE-2008-1235, CVE-2008-1236, CVE-2008-1237, CVE-2008-1238, CVE-2008-1241

BID: 28448

CWE: 20, 287, 399, 59, 79, 94

RHSA: 2008:0208