Lucene search

K
centosCentOS ProjectCESA-2010:0557
HistoryJul 27, 2010 - 2:23 p.m.

seamonkey security update

2010-07-2714:23:17
CentOS Project
lists.centos.org
46

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.221 Low

EPSS

Percentile

96.5%

CentOS Errata and Security Advisory CESA-2010:0557

SeaMonkey is an open source web browser, email and newsgroup client, IRC
chat client, and HTML editor.

An invalid free flaw was found in SeaMonkeyโ€™s plugin handler. Malicious web
content could result in an invalid memory pointer being freed, causing SeaMonkey
to crash or, potentially, execute arbitrary code with the privileges of the user
running SeaMonkey. (CVE-2010-2755)

All SeaMonkey users should upgrade to these updated packages, which correct
this issue. After installing the update, SeaMonkey must be restarted for
the changes to take effect.

Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-announce/2010-August/079088.html
https://lists.centos.org/pipermail/centos-announce/2010-August/079089.html
https://lists.centos.org/pipermail/centos-announce/2010-July/078995.html
https://lists.centos.org/pipermail/centos-announce/2010-July/078996.html

Affected packages:
seamonkey
seamonkey-chat
seamonkey-devel
seamonkey-dom-inspector
seamonkey-js-debugger
seamonkey-mail
seamonkey-nspr
seamonkey-nspr-devel
seamonkey-nss
seamonkey-nss-devel

Upstream details at:
https://access.redhat.com/errata/RHSA-2010:0557

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.221 Low

EPSS

Percentile

96.5%