Date:         Tue, 27 Nov 2007 15:45:25 -0600
Reply-To:     Troy Dawson 
Sender:       Security Errata for Scientific Linux
              
From:         Troy Dawson 
Subject:      Security ERRATA for seamonkey on SL4.x, SL3.x i386/x86_64
Comments: To: "scientific-linux-errata@fnal.gov"
          

Synopsis:	Critical: seamonkey security update
Issue date:	2007-11-26
CVE Names:	CVE-2007-5947 CVE-2007-5959 CVE-2007-5960

A cross-site scripting flaw was found in the way SeaMonkey handled the
jar: URI scheme. It was possible for a malicious website to leverage this
flaw and conduct a cross-site scripting attack against a user running
SeaMonkey. (CVE-2007-5947)

Several flaws were found in the way SeaMonkey processed certain malformed
web content. A webpage containing malicious content could cause SeaMonkey
to crash, or potentially execute arbitrary code as the user running
SeaMonkey. (CVE-2007-5959)

A race condition existed when Seamonkey set the "window.location" property
for a webpage. This flaw could allow a webpage to set an arbitrary Referer
header, which may lead to a Cross-site Request Forgery (CSRF) attack
against websites that rely only on the Referer header for protection.
(CVE-2007-5960)

SL 3.0.x

    SRPMS:
seamonkey-1.0.9-0.7.el3.src.rpm
    i386:
seamonkey-1.0.9-0.7.el3.i386.rpm
seamonkey-chat-1.0.9-0.7.el3.i386.rpm
seamonkey-devel-1.0.9-0.7.el3.i386.rpm
seamonkey-dom-inspector-1.0.9-0.7.el3.i386.rpm
seamonkey-js-debugger-1.0.9-0.7.el3.i386.rpm
seamonkey-mail-1.0.9-0.7.el3.i386.rpm
seamonkey-nspr-1.0.9-0.7.el3.i386.rpm
seamonkey-nspr-devel-1.0.9-0.7.el3.i386.rpm
seamonkey-nss-1.0.9-0.7.el3.i386.rpm
seamonkey-nss-devel-1.0.9-0.7.el3.i386.rpm
    x86_64:
seamonkey-1.0.9-0.7.el3.i386.rpm
seamonkey-1.0.9-0.7.el3.x86_64.rpm
seamonkey-chat-1.0.9-0.7.el3.i386.rpm
seamonkey-chat-1.0.9-0.7.el3.x86_64.rpm
seamonkey-devel-1.0.9-0.7.el3.x86_64.rpm
seamonkey-dom-inspector-1.0.9-0.7.el3.i386.rpm
seamonkey-dom-inspector-1.0.9-0.7.el3.x86_64.rpm
seamonkey-js-debugger-1.0.9-0.7.el3.i386.rpm
seamonkey-js-debugger-1.0.9-0.7.el3.x86_64.rpm
seamonkey-mail-1.0.9-0.7.el3.i386.rpm
seamonkey-mail-1.0.9-0.7.el3.x86_64.rpm
seamonkey-nspr-1.0.9-0.7.el3.i386.rpm
seamonkey-nspr-1.0.9-0.7.el3.x86_64.rpm
seamonkey-nspr-devel-1.0.9-0.7.el3.x86_64.rpm
seamonkey-nss-1.0.9-0.7.el3.i386.rpm
seamonkey-nss-1.0.9-0.7.el3.x86_64.rpm
seamonkey-nss-devel-1.0.9-0.7.el3.x86_64.rpm

SL 4.x

    SRPMS:
seamonkey-1.0.9-7.el4.src.rpm
    i386:
seamonkey-1.0.9-7.el4.i386.rpm
seamonkey-chat-1.0.9-7.el4.i386.rpm
seamonkey-devel-1.0.9-7.el4.i386.rpm
seamonkey-dom-inspector-1.0.9-7.el4.i386.rpm
seamonkey-js-debugger-1.0.9-7.el4.i386.rpm
seamonkey-mail-1.0.9-7.el4.i386.rpm
seamonkey-nspr-1.0.9-7.el4.i386.rpm
seamonkey-nspr-devel-1.0.9-7.el4.i386.rpm
seamonkey-nss-1.0.9-7.el4.i386.rpm
seamonkey-nss-devel-1.0.9-7.el4.i386.rpm
    x86_64:
seamonkey-1.0.9-7.el4.i386.rpm
seamonkey-1.0.9-7.el4.x86_64.rpm
seamonkey-chat-1.0.9-7.el4.i386.rpm
seamonkey-chat-1.0.9-7.el4.x86_64.rpm
seamonkey-devel-1.0.9-7.el4.x86_64.rpm
seamonkey-dom-inspector-1.0.9-7.el4.i386.rpm
seamonkey-dom-inspector-1.0.9-7.el4.x86_64.rpm
seamonkey-js-debugger-1.0.9-7.el4.i386.rpm
seamonkey-js-debugger-1.0.9-7.el4.x86_64.rpm
seamonkey-mail-1.0.9-7.el4.i386.rpm
seamonkey-mail-1.0.9-7.el4.x86_64.rpm
seamonkey-nspr-1.0.9-7.el4.i386.rpm
seamonkey-nspr-1.0.9-7.el4.x86_64.rpm
seamonkey-nspr-devel-1.0.9-7.el4.x86_64.rpm
seamonkey-nss-1.0.9-7.el4.i386.rpm
seamonkey-nss-1.0.9-7.el4.x86_64.rpm
seamonkey-nss-devel-1.0.9-7.el4.x86_64.rpm

-Connie Sieh
-Troy Dawson

SciLinux: CVE-2007-5947 seamonkey SL4.x, SL3.x i386/x86_64

Critical: seamonkey security update

Summary

Date:         Tue, 27 Nov 2007 15:45:25 -0600Reply-To:     Troy Dawson Sender:       Security Errata for Scientific Linux              From:         Troy Dawson Subject:      Security ERRATA for seamonkey on SL4.x, SL3.x i386/x86_64Comments: To: "scientific-linux-errata@fnal.gov"          Synopsis:	Critical: seamonkey security updateIssue date:	2007-11-26CVE Names:	CVE-2007-5947 CVE-2007-5959 CVE-2007-5960A cross-site scripting flaw was found in the way SeaMonkey handled thejar: URI scheme. It was possible for a malicious website to leverage thisflaw and conduct a cross-site scripting attack against a user runningSeaMonkey. (CVE-2007-5947)Several flaws were found in the way SeaMonkey processed certain malformedweb content. A webpage containing malicious content could cause SeaMonkeyto crash, or potentially execute arbitrary code as the user runningSeaMonkey. (CVE-2007-5959)A race condition existed when Seamonkey set the "window.location" propertyfor a webpage. This flaw could allow a webpage to set an arbitrary Refererheader, which may lead to a Cross-site Request Forgery (CSRF) attackagainst websites that rely only on the Referer header for protection.(CVE-2007-5960)SL 3.0.x    SRPMS:seamonkey-1.0.9-0.7.el3.src.rpm    i386:seamonkey-1.0.9-0.7.el3.i386.rpmseamonkey-chat-1.0.9-0.7.el3.i386.rpmseamonkey-devel-1.0.9-0.7.el3.i386.rpmseamonkey-dom-inspector-1.0.9-0.7.el3.i386.rpmseamonkey-js-debugger-1.0.9-0.7.el3.i386.rpmseamonkey-mail-1.0.9-0.7.el3.i386.rpmseamonkey-nspr-1.0.9-0.7.el3.i386.rpmseamonkey-nspr-devel-1.0.9-0.7.el3.i386.rpmseamonkey-nss-1.0.9-0.7.el3.i386.rpmseamonkey-nss-devel-1.0.9-0.7.el3.i386.rpm    x86_64:seamonkey-1.0.9-0.7.el3.i386.rpmseamonkey-1.0.9-0.7.el3.x86_64.rpmseamonkey-chat-1.0.9-0.7.el3.i386.rpmseamonkey-chat-1.0.9-0.7.el3.x86_64.rpmseamonkey-devel-1.0.9-0.7.el3.x86_64.rpmseamonkey-dom-inspector-1.0.9-0.7.el3.i386.rpmseamonkey-dom-inspector-1.0.9-0.7.el3.x86_64.rpmseamonkey-js-debugger-1.0.9-0.7.el3.i386.rpmseamonkey-js-debugger-1.0.9-0.7.el3.x86_64.rpmseamonkey-mail-1.0.9-0.7.el3.i386.rpmseamonkey-mail-1.0.9-0.7.el3.x86_64.rpmseamonkey-nspr-1.0.9-0.7.el3.i386.rpmseamonkey-nspr-1.0.9-0.7.el3.x86_64.rpmseamonkey-nspr-devel-1.0.9-0.7.el3.x86_64.rpmseamonkey-nss-1.0.9-0.7.el3.i386.rpmseamonkey-nss-1.0.9-0.7.el3.x86_64.rpmseamonkey-nss-devel-1.0.9-0.7.el3.x86_64.rpmSL 4.x    SRPMS:seamonkey-1.0.9-7.el4.src.rpm    i386:seamonkey-1.0.9-7.el4.i386.rpmseamonkey-chat-1.0.9-7.el4.i386.rpmseamonkey-devel-1.0.9-7.el4.i386.rpmseamonkey-dom-inspector-1.0.9-7.el4.i386.rpmseamonkey-js-debugger-1.0.9-7.el4.i386.rpmseamonkey-mail-1.0.9-7.el4.i386.rpmseamonkey-nspr-1.0.9-7.el4.i386.rpmseamonkey-nspr-devel-1.0.9-7.el4.i386.rpmseamonkey-nss-1.0.9-7.el4.i386.rpmseamonkey-nss-devel-1.0.9-7.el4.i386.rpm    x86_64:seamonkey-1.0.9-7.el4.i386.rpmseamonkey-1.0.9-7.el4.x86_64.rpmseamonkey-chat-1.0.9-7.el4.i386.rpmseamonkey-chat-1.0.9-7.el4.x86_64.rpmseamonkey-devel-1.0.9-7.el4.x86_64.rpmseamonkey-dom-inspector-1.0.9-7.el4.i386.rpmseamonkey-dom-inspector-1.0.9-7.el4.x86_64.rpmseamonkey-js-debugger-1.0.9-7.el4.i386.rpmseamonkey-js-debugger-1.0.9-7.el4.x86_64.rpmseamonkey-mail-1.0.9-7.el4.i386.rpmseamonkey-mail-1.0.9-7.el4.x86_64.rpmseamonkey-nspr-1.0.9-7.el4.i386.rpmseamonkey-nspr-1.0.9-7.el4.x86_64.rpmseamonkey-nspr-devel-1.0.9-7.el4.x86_64.rpmseamonkey-nss-1.0.9-7.el4.i386.rpmseamonkey-nss-1.0.9-7.el4.x86_64.rpmseamonkey-nss-devel-1.0.9-7.el4.x86_64.rpm-Connie Sieh-Troy Dawson



Security Fixes

Severity

Related News