Description: | Description: The remote host is missing an update to seamonkey announced via advisory FEDORA-2010-5840.
Update Information:
Update to new upstream SeaMonkey version 2.0.4, fixing multiple security issues detailed in the upstream advisories: http://www.mozilla.org/security/known-vulnerabilities/seamonkey20.html#seamonkey2.0.4
References:
[ 1 ] Bug #578147 - CVE-2010-0174 Mozilla crashes with evidence of memory corruption https://bugzilla.redhat.com/show_bug.cgi?id=578147 [ 2 ] Bug #578149 - CVE-2010-0175 Mozilla remote code execution with use-after-free in nsTreeSelection https://bugzilla.redhat.com/show_bug.cgi?id=578149 [ 3 ] Bug #578150 - CVE-2010-0176 Mozilla Dangling pointer vulnerability in nsTreeContentView https://bugzilla.redhat.com/show_bug.cgi?id=578150 [ 4 ] Bug #578152 - CVE-2010-0177 Mozilla Dangling pointer vulnerability in nsPluginArray https://bugzilla.redhat.com/show_bug.cgi?id=578152 [ 5 ] Bug #578154 - CVE-2010-0178 Firefox Chrome privilege escalation via forced URL drag and drop https://bugzilla.redhat.com/show_bug.cgi?id=578154
Solution: Apply the appropriate updates.
This update can be installed with the yum update program. Use su -c 'yum update seamonkey' at the command line. For more information, refer to Managing Software with yum, available at http://docs.fedoraproject.org/yum/.
https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2010-5840
Risk factor : Critical
CVSS Score: 10.0
|