Date:         Wed, 28 Oct 2009 13:26:57 -0500
Reply-To:     Troy Dawson 
Sender:       Security Errata for Scientific Linux
              
From:         Troy Dawson 
Subject:      Security ERRATA Critical: seamonkey on SL3.x, SL4.x i386/x86_64
Comments: To: "scientific-linux-errata@fnal.gov"
          

Synopsis:	Critical: seamonkey security update
Issue date:	2009-10-27
CVE Names:	CVE-2009-1563 CVE-2009-3274 CVE-2009-3375
                   CVE-2009-3376 CVE-2009-3380

A flaw was found in the way SeaMonkey creates temporary file names for
downloaded files. If a local attacker knows the name of a file SeaMonkey 
is going to download, they can replace the contents of that file with
arbitrary contents. (CVE-2009-3274)

A heap-based buffer overflow flaw was found in the SeaMonkey string to
floating point conversion routines. A web page containing malicious
JavaScript could crash SeaMonkey or, potentially, execute arbitrary code
with the privileges of the user running SeaMonkey. (CVE-2009-1563)

A flaw was found in the way SeaMonkey handles text selection. A 
malicious website may be able to read highlighted text in a different 
domain (e.g. another website the user is viewing), bypassing the 
same-origin policy. (CVE-2009-3375)

A flaw was found in the way SeaMonkey displays a right-to-left override
character when downloading a file. In these cases, the name displayed in
the title bar differs from the name displayed in the dialog body. An
attacker could use this flaw to trick a user into downloading a file 
that has a file name or extension that differs from what the user 
expected. (CVE-2009-3376)

Several flaws were found in the processing of malformed web content. A 
web page containing malicious content could cause SeaMonkey to crash or,
potentially, execute arbitrary code with the privileges of the user 
running SeaMonkey. (CVE-2009-3380)

After installing the update, SeaMonkey must be restarted for the changes 
to take effect.


SL 3.0.x

      SRPMS:
seamonkey-1.0.9-0.47.el3.src.rpm
      i386:
seamonkey-1.0.9-0.47.el3.i386.rpm
seamonkey-chat-1.0.9-0.47.el3.i386.rpm
seamonkey-devel-1.0.9-0.47.el3.i386.rpm
seamonkey-dom-inspector-1.0.9-0.47.el3.i386.rpm
seamonkey-js-debugger-1.0.9-0.47.el3.i386.rpm
seamonkey-mail-1.0.9-0.47.el3.i386.rpm
seamonkey-nspr-1.0.9-0.47.el3.i386.rpm
seamonkey-nspr-devel-1.0.9-0.47.el3.i386.rpm
seamonkey-nss-1.0.9-0.47.el3.i386.rpm
seamonkey-nss-devel-1.0.9-0.47.el3.i386.rpm
      x86_64:
seamonkey-1.0.9-0.47.el3.i386.rpm
seamonkey-1.0.9-0.47.el3.x86_64.rpm
seamonkey-chat-1.0.9-0.47.el3.i386.rpm
seamonkey-chat-1.0.9-0.47.el3.x86_64.rpm
seamonkey-devel-1.0.9-0.47.el3.x86_64.rpm
seamonkey-dom-inspector-1.0.9-0.47.el3.i386.rpm
seamonkey-dom-inspector-1.0.9-0.47.el3.x86_64.rpm
seamonkey-js-debugger-1.0.9-0.47.el3.i386.rpm
seamonkey-js-debugger-1.0.9-0.47.el3.x86_64.rpm
seamonkey-mail-1.0.9-0.47.el3.i386.rpm
seamonkey-mail-1.0.9-0.47.el3.x86_64.rpm
seamonkey-nspr-1.0.9-0.47.el3.i386.rpm
seamonkey-nspr-1.0.9-0.47.el3.x86_64.rpm
seamonkey-nspr-devel-1.0.9-0.47.el3.x86_64.rpm
seamonkey-nss-1.0.9-0.47.el3.i386.rpm
seamonkey-nss-1.0.9-0.47.el3.x86_64.rpm
seamonkey-nss-devel-1.0.9-0.47.el3.x86_64.rpm

SL 4.x

      SRPMS:
seamonkey-1.0.9-50.el4_8.src.rpm
      i386:
seamonkey-1.0.9-50.el4_8.i386.rpm
seamonkey-chat-1.0.9-50.el4_8.i386.rpm
seamonkey-devel-1.0.9-50.el4_8.i386.rpm
seamonkey-dom-inspector-1.0.9-50.el4_8.i386.rpm
seamonkey-js-debugger-1.0.9-50.el4_8.i386.rpm
seamonkey-mail-1.0.9-50.el4_8.i386.rpm
      x86_64:
seamonkey-1.0.9-50.el4_8.i386.rpm
seamonkey-1.0.9-50.el4_8.x86_64.rpm
seamonkey-chat-1.0.9-50.el4_8.i386.rpm
seamonkey-chat-1.0.9-50.el4_8.x86_64.rpm
seamonkey-devel-1.0.9-50.el4_8.x86_64.rpm
seamonkey-dom-inspector-1.0.9-50.el4_8.i386.rpm
seamonkey-dom-inspector-1.0.9-50.el4_8.x86_64.rpm
seamonkey-js-debugger-1.0.9-50.el4_8.i386.rpm
seamonkey-js-debugger-1.0.9-50.el4_8.x86_64.rpm
seamonkey-mail-1.0.9-50.el4_8.i386.rpm
seamonkey-mail-1.0.9-50.el4_8.x86_64.rpm

-Connie Sieh
-Troy Dawson
lastline

SciLinux: CVE-2009-1563 Critical: seamonkey SL3.x, SL4.x i386/x86_64

Critical: seamonkey security update

Summary

Date:         Wed, 28 Oct 2009 13:26:57 -0500Reply-To:     Troy Dawson Sender:       Security Errata for Scientific Linux              From:         Troy Dawson Subject:      Security ERRATA Critical: seamonkey on SL3.x, SL4.x i386/x86_64Comments: To: "scientific-linux-errata@fnal.gov"          Synopsis:	Critical: seamonkey security updateIssue date:	2009-10-27CVE Names:	CVE-2009-1563 CVE-2009-3274 CVE-2009-3375                   CVE-2009-3376 CVE-2009-3380A flaw was found in the way SeaMonkey creates temporary file names fordownloaded files. If a local attacker knows the name of a file SeaMonkey is going to download, they can replace the contents of that file witharbitrary contents. (CVE-2009-3274)A heap-based buffer overflow flaw was found in the SeaMonkey string tofloating point conversion routines. A web page containing maliciousJavaScript could crash SeaMonkey or, potentially, execute arbitrary codewith the privileges of the user running SeaMonkey. (CVE-2009-1563)A flaw was found in the way SeaMonkey handles text selection. A malicious website may be able to read highlighted text in a different domain (e.g. another website the user is viewing), bypassing the same-origin policy. (CVE-2009-3375)A flaw was found in the way SeaMonkey displays a right-to-left overridecharacter when downloading a file. In these cases, the name displayed inthe title bar differs from the name displayed in the dialog body. Anattacker could use this flaw to trick a user into downloading a file that has a file name or extension that differs from what the user expected. (CVE-2009-3376)Several flaws were found in the processing of malformed web content. A web page containing malicious content could cause SeaMonkey to crash or,potentially, execute arbitrary code with the privileges of the user running SeaMonkey. (CVE-2009-3380)After installing the update, SeaMonkey must be restarted for the changes to take effect.SL 3.0.x      SRPMS:seamonkey-1.0.9-0.47.el3.src.rpm      i386:seamonkey-1.0.9-0.47.el3.i386.rpmseamonkey-chat-1.0.9-0.47.el3.i386.rpmseamonkey-devel-1.0.9-0.47.el3.i386.rpmseamonkey-dom-inspector-1.0.9-0.47.el3.i386.rpmseamonkey-js-debugger-1.0.9-0.47.el3.i386.rpmseamonkey-mail-1.0.9-0.47.el3.i386.rpmseamonkey-nspr-1.0.9-0.47.el3.i386.rpmseamonkey-nspr-devel-1.0.9-0.47.el3.i386.rpmseamonkey-nss-1.0.9-0.47.el3.i386.rpmseamonkey-nss-devel-1.0.9-0.47.el3.i386.rpm      x86_64:seamonkey-1.0.9-0.47.el3.i386.rpmseamonkey-1.0.9-0.47.el3.x86_64.rpmseamonkey-chat-1.0.9-0.47.el3.i386.rpmseamonkey-chat-1.0.9-0.47.el3.x86_64.rpmseamonkey-devel-1.0.9-0.47.el3.x86_64.rpmseamonkey-dom-inspector-1.0.9-0.47.el3.i386.rpmseamonkey-dom-inspector-1.0.9-0.47.el3.x86_64.rpmseamonkey-js-debugger-1.0.9-0.47.el3.i386.rpmseamonkey-js-debugger-1.0.9-0.47.el3.x86_64.rpmseamonkey-mail-1.0.9-0.47.el3.i386.rpmseamonkey-mail-1.0.9-0.47.el3.x86_64.rpmseamonkey-nspr-1.0.9-0.47.el3.i386.rpmseamonkey-nspr-1.0.9-0.47.el3.x86_64.rpmseamonkey-nspr-devel-1.0.9-0.47.el3.x86_64.rpmseamonkey-nss-1.0.9-0.47.el3.i386.rpmseamonkey-nss-1.0.9-0.47.el3.x86_64.rpmseamonkey-nss-devel-1.0.9-0.47.el3.x86_64.rpmSL 4.x      SRPMS:seamonkey-1.0.9-50.el4_8.src.rpm      i386:seamonkey-1.0.9-50.el4_8.i386.rpmseamonkey-chat-1.0.9-50.el4_8.i386.rpmseamonkey-devel-1.0.9-50.el4_8.i386.rpmseamonkey-dom-inspector-1.0.9-50.el4_8.i386.rpmseamonkey-js-debugger-1.0.9-50.el4_8.i386.rpmseamonkey-mail-1.0.9-50.el4_8.i386.rpm      x86_64:seamonkey-1.0.9-50.el4_8.i386.rpmseamonkey-1.0.9-50.el4_8.x86_64.rpmseamonkey-chat-1.0.9-50.el4_8.i386.rpmseamonkey-chat-1.0.9-50.el4_8.x86_64.rpmseamonkey-devel-1.0.9-50.el4_8.x86_64.rpmseamonkey-dom-inspector-1.0.9-50.el4_8.i386.rpmseamonkey-dom-inspector-1.0.9-50.el4_8.x86_64.rpmseamonkey-js-debugger-1.0.9-50.el4_8.i386.rpmseamonkey-js-debugger-1.0.9-50.el4_8.x86_64.rpmseamonkey-mail-1.0.9-50.el4_8.i386.rpmseamonkey-mail-1.0.9-50.el4_8.x86_64.rpm-Connie Sieh-Troy Dawsonlastline



Security Fixes

Severity

Related News