Lucene search

K
centosCentOS ProjectCESA-2011:1344
HistorySep 29, 2011 - 6:51 p.m.

seamonkey security update

2011-09-2918:51:19
CentOS Project
lists.centos.org
50

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.082 Low

EPSS

Percentile

94.3%

CentOS Errata and Security Advisory CESA-2011:1344

SeaMonkey is an open source web browser, email and newsgroup client, IRC
chat client, and HTML editor.

A flaw was found in the way SeaMonkey handled frame objects with certain
names. An attacker could use this flaw to cause a plug-in to grant its
content access to another site or the local file system, violating the
same-origin policy. (CVE-2011-2999)

An integer underflow flaw was found in the way SeaMonkey handled large
JavaScript regular expressions. A web page containing malicious JavaScript
could cause SeaMonkey to access already freed memory, causing SeaMonkey to
crash or, potentially, execute arbitrary code with the privileges of the
user running SeaMonkey. (CVE-2011-2998)

All SeaMonkey users should upgrade to these updated packages, which correct
these issues. After installing the update, SeaMonkey must be restarted for
the changes to take effect.

Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-announce/2011-September/080251.html
https://lists.centos.org/pipermail/centos-announce/2011-September/080252.html

Affected packages:
seamonkey
seamonkey-chat
seamonkey-devel
seamonkey-dom-inspector
seamonkey-js-debugger
seamonkey-mail

Upstream details at:
https://access.redhat.com/errata/RHSA-2011:1344

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.082 Low

EPSS

Percentile

94.3%