what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Secunia Security Advisory 27979

Secunia Security Advisory 27979
Posted Dec 11, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for seamonkey. This fixes some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting and cross-site request forgery attacks and potentially to compromise a user's system.

tags | advisory, vulnerability, xss, csrf
systems | linux, fedora
SHA-256 | 5a1b832fac6fef486532d9f69ba1ae7d59a650c60112f0f4bba122851404fe6f

Secunia Security Advisory 27979

Change Mirror Download


----------------------------------------------------------------------

2003: 2,700 advisories published
2004: 3,100 advisories published
2005: 4,600 advisories published
2006: 5,300 advisories published

How do you know which Secunia advisories are important to you?

The Secunia Vulnerability Intelligence Solutions allows you to filter
and structure all the information you need, so you can address issues
effectively.

Get a free trial of the Secunia Vulnerability Intelligence Solutions:
http://corporate.secunia.com/how_to_buy/38/vi/?ref=secadv

----------------------------------------------------------------------

TITLE:
Fedora update for seamonkey

SECUNIA ADVISORY ID:
SA27979

VERIFY ADVISORY:
http://secunia.com/advisories/27979/

CRITICAL:
Highly critical

IMPACT:
Cross Site Scripting, DoS, System access

WHERE:
>From remote

OPERATING SYSTEM:
Fedora 7
http://secunia.com/product/15552/
Fedora 8
http://secunia.com/product/16769/

DESCRIPTION:
Fedora has issued an update for seamonkey. This fixes some
vulnerabilities, which can be exploited by malicious people to
conduct cross-site scripting and cross-site request forgery attacks
and potentially to compromise a user's system.

For more information:
SA27816

SOLUTION:
Apply updated packages.

-- Fedora 7 --

c46a5b083f291e0f8c0883abdfaf03fe5d985951
seamonkey-1.1.7-1.fc7.ppc64.rpm
127dc5f0d9811e6b3719778c5e898414df5d5d98
seamonkey-debuginfo-1.1.7-1.fc7.ppc64.rpm
fde0e13fec433b880ed267f5bd95d6f34e3deb68
seamonkey-debuginfo-1.1.7-1.fc7.i386.rpm
8c69af5292e48e435c85448d01dcba46c9f54c43
seamonkey-1.1.7-1.fc7.i386.rpm
7fd64cc51de038e2fc1589b989e773e48d650499
seamonkey-1.1.7-1.fc7.x86_64.rpm
eb1fd908a746d91ad1de3568d18a3f6f735673f6
seamonkey-debuginfo-1.1.7-1.fc7.x86_64.rpm
da12bc3b281d71a5ba05b9bcdf51900fdd1bd3b3
seamonkey-debuginfo-1.1.7-1.fc7.ppc.rpm
01cccc6cd943929a6c7df1ae29ef4aed5209de7e
seamonkey-1.1.7-1.fc7.ppc.rpm
a6cab9461d6b2941ec60a7f1690a8a04f6f0e2f2
seamonkey-1.1.7-1.fc7.src.rpm

-- Fedora 8 --

0bb8b53a40098142b31bb7d2f7d78009f89dae0e
seamonkey-1.1.7-1.fc8.ppc64.rpm
9c7ac2ab69265b827b1536f26d41dcd00c6b4cff
seamonkey-debuginfo-1.1.7-1.fc8.ppc64.rpm
c3d287ce594ffd4183778c3b64008e9072093a1a
seamonkey-debuginfo-1.1.7-1.fc8.i386.rpm
581b48f6a57004687c42753711f00b0368431c9e
seamonkey-1.1.7-1.fc8.i386.rpm
20e158f810c40c15b1b77f3bc8bbf6e4606cbf75
seamonkey-1.1.7-1.fc8.x86_64.rpm
83add2669c7d80caaf7c73350ce6bd5eab183885
seamonkey-debuginfo-1.1.7-1.fc8.x86_64.rpm
6a340aba1d04c08a68b9aae2a71babc1daf68ead
seamonkey-1.1.7-1.fc8.ppc.rpm
4106a969baebb739f6a43330bdcbcd0fa1284c75
seamonkey-debuginfo-1.1.7-1.fc8.ppc.rpm
d2c36a8117398496c8dd69b03b525044f6aa02b8
seamonkey-1.1.7-1.fc8.src.rpm

ORIGINAL ADVISORY:
https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00135.html
https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00168.html

OTHER REFERENCES:
SA27816:
http://secunia.com/advisories/27816/

----------------------------------------------------------------------

About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.

Subscribe:
http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/


Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.

----------------------------------------------------------------------

Login or Register to add favorites

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close