English | Deutsch | Español | Português
 UserID:
 Passwd:
new user
 About:   Dedicated  | Advanced  | Standard  | Recurring  | No Risk  | Desktop  | Basic  | Single  | Security Seal  | FAQ
  Price/Feature Summary  | Order  | New Vulnerabilities  | Confidentiality  | Vulnerability Search
 Vulnerability   
Search   
    Search 95248 CVE descriptions
and 52540 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.57368
Category:Red Hat Local Security Checks
Title:RedHat Security Advisory RHSA-2006:0676
Summary:Redhat Security Advisory RHSA-2006:0676
Description:Description:

The remote host is missing updates announced in
advisory RHSA-2006:0676.

SeaMonkey is an open source Web browser, advanced email and newsgroup
client, IRC chat client, and HTML editor.

Two flaws were found in the way SeaMonkey processed certain regular
expressions. A malicious web page could crash the browser or possibly
execute arbitrary code as the user running SeaMonkey. (CVE-2006-4565,
CVE-2006-4566)

A flaw was found in the handling of Javascript timed events. A malicious
web page could crash the browser or possibly execute arbitrary code as the
user running SeaMonkey. (CVE-2006-4253)

Daniel Bleichenbacher recently described an implementation error in RSA
signature verification. For RSA keys with exponent 3 it is possible for an
attacker to forge a signature that would be incorrectly verified by the NSS
library. SeaMonkey as shipped trusts several root Certificate Authorities
that use exponent 3. An attacker could have created a carefully crafted
SSL certificate which be incorrectly trusted when their site was visited by
a victim. (CVE-2006-4340)

SeaMonkey did not properly prevent a frame in one domain from injecting
content into a sub-frame that belongs to another domain, which facilitates
website spoofing and other attacks (CVE-2006-4568)

A flaw was found in SeaMonkey Messenger triggered when a HTML message
contained a remote image pointing to a XBL script. An attacker could have
created a carefully crafted message which would execute Javascript if
certain actions were performed on the email by the recipient, even if
Javascript was disabled. (CVE-2006-4570)

A number of flaws were found in SeaMonkey. A malicious web page could
crash the browser or possibly execute arbitrary code as the user running
SeaMonkey. (CVE-2006-4571)

Users of SeaMonkey or Mozilla are advised to upgrade to this update, which
contains SeaMonkey version 1.0.5 that corrects these issues.

For users of Red Hat Enterprise Linux 2.1 this SeaMonkey update obsoletes
Galeon. Galeon was a web browser based on the Mozilla Gecko layout engine.

Solution:
Please note that this update is available via
Red Hat Network. To use Red Hat Network, launch the Red
Hat Update Agent with the following command: up2date

http://rhn.redhat.com/errata/RHSA-2006-0676.html
http://www.redhat.com/security/updates/classification/#critical

Risk factor : Critical

CVSS Score:
10.0

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2006-4253
Bugtraq: 20060812 Concurrency-related vulnerabilities in browsers - expect problems (Google Search)
http://www.securityfocus.com/archive/1/archive/1/443020/100/100/threaded
Bugtraq: 20061006 Re: Concurrency-related vulnerabilities in browsers - expect problems (Google Search)
http://www.securityfocus.com/archive/1/443306/100/100/threaded
Bugtraq: 20060817 RE: [VulnWatch] Re: Concurrency-related vulnerabilities in browsers - expect problems (Google Search)
http://www.securityfocus.com/archive/1/archive/1/443528/100/0/threaded
Bugtraq: 20060817 Re: [VulnWatch] Re: Concurrency-related vulnerabilities in browsers - expect problems (Google Search)
http://www.securityfocus.com/archive/1/443500/100/100/threaded
http://www.securityfocus.com/archive/1/archive/1/447840/100/200/threaded
http://www.securityfocus.com/archive/1/archive/1/447837/100/200/threaded
Bugtraq: 20061017 Flaw in Firefox 2.0 RC2 (Google Search)
http://www.securityfocus.com/archive/1/archive/1/448956/100/100/threaded
Bugtraq: 20061019 Re: Flaw in Firefox 2.0 RC2 (Google Search)
http://www.securityfocus.com/archive/1/archive/1/448984/100/100/threaded
Bugtraq: 20061023 Flaw in Firefox 2.0 Final (Google Search)
http://www.securityfocus.com/archive/1/archive/1/449487/100/0/threaded
http://www.securityfocus.com/archive/1/archive/1/449245/100/100/threaded
Bugtraq: 20061025 Mozilla Firefox JavaScript Handler Race Condition Memory Corruption Vulnerability (Google Search)
http://www.securityfocus.com/archive/1/archive/1/449726/100/0/threaded
Bugtraq: 20060915 rPSA-2006-0169-1 firefox thunderbird (Google Search)
http://www.securityfocus.com/archive/1/archive/1/446140/100/0/threaded
http://lcamtuf.coredump.cx/ffoxdie.html
http://lcamtuf.coredump.cx/ffoxdie3.html
http://www.securiteam.com/securitynews/5VP0M0AJFW.html
http://www.pianetapc.it/view.php?id=770
http://security.gentoo.org/glsa/glsa-200609-19.xml
http://security.gentoo.org/glsa/glsa-200610-01.xml
http://security.gentoo.org/glsa/glsa-200610-04.xml
HPdes Security Advisory: HPSBUX02153
http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=c00771742
HPdes Security Advisory: SSRT061181
http://www.mandriva.com/security/advisories?name=MDKSA-2006:168
http://www.mandriva.com/security/advisories?name=MDKSA-2006:169
http://www.redhat.com/support/errata/RHSA-2006-0676.html
http://www.redhat.com/support/errata/RHSA-2006-0677.html
http://www.redhat.com/support/errata/RHSA-2006-0675.html
SGI Security Advisory: 20060901-01-P
ftp://patches.sgi.com/support/free/security/advisories/20060901-01-P.asc
SuSE Security Announcement: SUSE-SA:2006:054 (Google Search)
http://www.novell.com/linux/security/advisories/2006_54_mozilla.html
http://www.ubuntu.com/usn/usn-350-1
http://www.ubuntu.com/usn/usn-351-1
http://www.ubuntu.com/usn/usn-352-1
http://www.ubuntu.com/usn/usn-354-1
BugTraq ID: 19534
http://www.securityfocus.com/bid/19534
BugTraq ID: 19488
http://www.securityfocus.com/bid/19488
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9528
http://www.vupen.com/english/advisories/2006/3617
http://www.vupen.com/english/advisories/2007/1198
http://www.vupen.com/english/advisories/2006/3748
http://www.vupen.com/english/advisories/2008/0083
http://securitytracker.com/id?1016846
http://securitytracker.com/id?1016847
http://securitytracker.com/id?1016848
http://secunia.com/advisories/21513
http://secunia.com/advisories/21906
http://secunia.com/advisories/21949
http://secunia.com/advisories/21915
http://secunia.com/advisories/21916
http://secunia.com/advisories/21939
http://secunia.com/advisories/21940
http://secunia.com/advisories/21950
http://secunia.com/advisories/22036
http://secunia.com/advisories/22001
http://secunia.com/advisories/22025
http://secunia.com/advisories/22055
http://secunia.com/advisories/22074
http://secunia.com/advisories/22088
http://secunia.com/advisories/22210
http://secunia.com/advisories/22274
http://secunia.com/advisories/22391
http://secunia.com/advisories/22422
http://secunia.com/advisories/22056
http://secunia.com/advisories/22195
http://secunia.com/advisories/24711
http://secunia.com/advisories/22066
Common Vulnerability Exposure (CVE) ID: CVE-2006-4340
http://www.imc.org/ietf-openpgp/mail-archive/msg14307.html
http://www.matasano.com/log/469/many-rsa-signatures-may-be-forgeable-in-openssl-and-elsewhere/
http://www.mozilla.org/security/announce/2006/mfsa2006-66.html
Debian Security Information: DSA-1191 (Google Search)
http://www.us.debian.org/security/2006/dsa-1191
Debian Security Information: DSA-1192 (Google Search)
http://www.debian.org/security/2006/dsa-1192
Debian Security Information: DSA-1210 (Google Search)
http://www.debian.org/security/2006/dsa-1210
http://www.gentoo.org/security/en/glsa/glsa-200610-06.xml
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102648-1
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102781-1
SuSE Security Announcement: SUSE-SA:2006:055 (Google Search)
http://www.novell.com/linux/security/advisories/2006_55_ssl.html
http://www.ubuntu.com/usn/usn-361-1
Cert/CC Advisory: TA06-312A
http://www.us-cert.gov/cas/techalerts/TA06-312A.html
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11007
http://www.vupen.com/english/advisories/2006/3622
http://www.vupen.com/english/advisories/2006/3899
http://www.vupen.com/english/advisories/2007/0293
http://securitytracker.com/id?1016858
http://securitytracker.com/id?1016859
http://securitytracker.com/id?1016860
http://secunia.com/advisories/21903
http://secunia.com/advisories/22226
http://secunia.com/advisories/22247
http://secunia.com/advisories/22299
http://secunia.com/advisories/22342
http://secunia.com/advisories/22446
http://secunia.com/advisories/22849
http://secunia.com/advisories/22992
http://secunia.com/advisories/23883
http://secunia.com/advisories/22044
XForce ISS Database: mozilla-nss-security-bypass(30098)
http://xforce.iss.net/xforce/xfdb/30098
Common Vulnerability Exposure (CVE) ID: CVE-2006-4565
BugTraq ID: 20042
http://www.securityfocus.com/bid/20042
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11421
XForce ISS Database: mozilla-javascript-expression-bo(28955)
http://xforce.iss.net/xforce/xfdb/28955
Common Vulnerability Exposure (CVE) ID: CVE-2006-4566
CERT/CC vulnerability note: VU#141528
http://www.kb.cert.org/vuls/id/141528
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9637
XForce ISS Database: mozilla-backslash-dos(28958)
http://xforce.iss.net/xforce/xfdb/28958
Common Vulnerability Exposure (CVE) ID: CVE-2006-4568
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9843
http://securitytracker.com/id?1016855
http://securitytracker.com/id?1016856
XForce ISS Database: mozilla-documentopen-frame-spoofing(28961)
http://xforce.iss.net/xforce/xfdb/28961
Common Vulnerability Exposure (CVE) ID: CVE-2006-4570
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10892
http://securitytracker.com/id?1016866
http://securitytracker.com/id?1016867
XForce ISS Database: thunderbird-seamonkey-xbl-code-execution(28962)
http://xforce.iss.net/xforce/xfdb/28962
Common Vulnerability Exposure (CVE) ID: CVE-2006-4571
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11728
CopyrightCopyright (c) 2006 E-Soft Inc. http://www.securityspace.com

This is only one of 52540 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.

New User Registration
Email:
UserID:
Passwd:
Please email me your monthly newsletters, informing the latest services, improvements & surveys.
Please email me a vulnerability test announcement whenever a new test is added.
   Privacy
Registered User Login
 
UserID:   
Passwd:  

 Forgot userid or passwd?
Email/Userid:




Home | About Us | Contact Us | Partner Programs | Developer APIs | Privacy | Mailing Lists | Abuse
Security Audits | Managed DNS | Network Monitoring | Site Analyzer | Internet Research Reports
Web Probe | Whois

© 1998-2016 E-Soft Inc. All rights reserved.