Date: Wed, 28 Oct 2009 13:26:57 -0500 Reply-To: Troy DawsonSender: Security Errata for Scientific Linux From: Troy Dawson Subject: Security ERRATA Critical: seamonkey on SL3.x, SL4.x i386/x86_64 Comments: To: "scientific-linux-errata@fnal.gov" Synopsis: Critical: seamonkey security update Issue date: 2009-10-27 CVE Names: CVE-2009-1563 CVE-2009-3274 CVE-2009-3375 CVE-2009-3376 CVE-2009-3380 A flaw was found in the way SeaMonkey creates temporary file names for downloaded files. If a local attacker knows the name of a file SeaMonkey is going to download, they can replace the contents of that file with arbitrary contents. (CVE-2009-3274) A heap-based buffer overflow flaw was found in the SeaMonkey string to floating point conversion routines. A web page containing malicious JavaScript could crash SeaMonkey or, potentially, execute arbitrary code with the privileges of the user running SeaMonkey. (CVE-2009-1563) A flaw was found in the way SeaMonkey handles text selection. A malicious website may be able to read highlighted text in a different domain (e.g. another website the user is viewing), bypassing the same-origin policy. (CVE-2009-3375) A flaw was found in the way SeaMonkey displays a right-to-left override character when downloading a file. In these cases, the name displayed in the title bar differs from the name displayed in the dialog body. An attacker could use this flaw to trick a user into downloading a file that has a file name or extension that differs from what the user expected. (CVE-2009-3376) Several flaws were found in the processing of malformed web content. A web page containing malicious content could cause SeaMonkey to crash or, potentially, execute arbitrary code with the privileges of the user running SeaMonkey. (CVE-2009-3380) After installing the update, SeaMonkey must be restarted for the changes to take effect. SL 3.0.x SRPMS: seamonkey-1.0.9-0.47.el3.src.rpm i386: seamonkey-1.0.9-0.47.el3.i386.rpm seamonkey-chat-1.0.9-0.47.el3.i386.rpm seamonkey-devel-1.0.9-0.47.el3.i386.rpm seamonkey-dom-inspector-1.0.9-0.47.el3.i386.rpm seamonkey-js-debugger-1.0.9-0.47.el3.i386.rpm seamonkey-mail-1.0.9-0.47.el3.i386.rpm seamonkey-nspr-1.0.9-0.47.el3.i386.rpm seamonkey-nspr-devel-1.0.9-0.47.el3.i386.rpm seamonkey-nss-1.0.9-0.47.el3.i386.rpm seamonkey-nss-devel-1.0.9-0.47.el3.i386.rpm x86_64: seamonkey-1.0.9-0.47.el3.i386.rpm seamonkey-1.0.9-0.47.el3.x86_64.rpm seamonkey-chat-1.0.9-0.47.el3.i386.rpm seamonkey-chat-1.0.9-0.47.el3.x86_64.rpm seamonkey-devel-1.0.9-0.47.el3.x86_64.rpm seamonkey-dom-inspector-1.0.9-0.47.el3.i386.rpm seamonkey-dom-inspector-1.0.9-0.47.el3.x86_64.rpm seamonkey-js-debugger-1.0.9-0.47.el3.i386.rpm seamonkey-js-debugger-1.0.9-0.47.el3.x86_64.rpm seamonkey-mail-1.0.9-0.47.el3.i386.rpm seamonkey-mail-1.0.9-0.47.el3.x86_64.rpm seamonkey-nspr-1.0.9-0.47.el3.i386.rpm seamonkey-nspr-1.0.9-0.47.el3.x86_64.rpm seamonkey-nspr-devel-1.0.9-0.47.el3.x86_64.rpm seamonkey-nss-1.0.9-0.47.el3.i386.rpm seamonkey-nss-1.0.9-0.47.el3.x86_64.rpm seamonkey-nss-devel-1.0.9-0.47.el3.x86_64.rpm SL 4.x SRPMS: seamonkey-1.0.9-50.el4_8.src.rpm i386: seamonkey-1.0.9-50.el4_8.i386.rpm seamonkey-chat-1.0.9-50.el4_8.i386.rpm seamonkey-devel-1.0.9-50.el4_8.i386.rpm seamonkey-dom-inspector-1.0.9-50.el4_8.i386.rpm seamonkey-js-debugger-1.0.9-50.el4_8.i386.rpm seamonkey-mail-1.0.9-50.el4_8.i386.rpm x86_64: seamonkey-1.0.9-50.el4_8.i386.rpm seamonkey-1.0.9-50.el4_8.x86_64.rpm seamonkey-chat-1.0.9-50.el4_8.i386.rpm seamonkey-chat-1.0.9-50.el4_8.x86_64.rpm seamonkey-devel-1.0.9-50.el4_8.x86_64.rpm seamonkey-dom-inspector-1.0.9-50.el4_8.i386.rpm seamonkey-dom-inspector-1.0.9-50.el4_8.x86_64.rpm seamonkey-js-debugger-1.0.9-50.el4_8.i386.rpm seamonkey-js-debugger-1.0.9-50.el4_8.x86_64.rpm seamonkey-mail-1.0.9-50.el4_8.i386.rpm seamonkey-mail-1.0.9-50.el4_8.x86_64.rpm -Connie Sieh -Troy Dawson lastline