4.4 Medium
CVSS2
Access Vector
LOCAL
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:L/AC:M/Au:N/C:P/I:P/A:P
SeaMonkey is vulnerable to unauthorized replacement. Due to a law found in the way SeaMonkey creates temporary file names for downloaded files. If a local attacker knows the name of a file SeaMonkey is going to download, they can replace the contents of that file with arbitrary contents.
jbrownsec.blogspot.com/2009/09/vamos-updates.html
secunia.com/advisories/36649
securitytube.net/Zero-Day-Demos-(Firefox-Vulnerability-Discovered)-video.aspx
sunsolve.sun.com/search/document.do?assetkey=1-26-272909-1
www.mandriva.com/security/advisories?name=MDVSA-2009:294
www.mozilla.org/security/announce/2009/mfsa2009-53.html
www.redhat.com/support/errata/RHSA-2010-0153.html
www.redhat.com/support/errata/RHSA-2010-0154.html
www.vupen.com/english/advisories/2009/3334
www.vupen.com/english/advisories/2010/0650
access.redhat.com/errata/RHSA-2009:1531
access.redhat.com/security/updates/classification/#critical
bugzilla.mozilla.org/show_bug.cgi?id=514823
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9641