exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Secunia Security Advisory 27979

Secunia Security Advisory 27979
Posted Dec 11, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for seamonkey. This fixes some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting and cross-site request forgery attacks and potentially to compromise a user's system.

tags | advisory, vulnerability, xss, csrf
systems | linux, fedora
SHA-256 | 5a1b832fac6fef486532d9f69ba1ae7d59a650c60112f0f4bba122851404fe6f

Secunia Security Advisory 27979

Change Mirror Download


----------------------------------------------------------------------

2003: 2,700 advisories published
2004: 3,100 advisories published
2005: 4,600 advisories published
2006: 5,300 advisories published

How do you know which Secunia advisories are important to you?

The Secunia Vulnerability Intelligence Solutions allows you to filter
and structure all the information you need, so you can address issues
effectively.

Get a free trial of the Secunia Vulnerability Intelligence Solutions:
http://corporate.secunia.com/how_to_buy/38/vi/?ref=secadv

----------------------------------------------------------------------

TITLE:
Fedora update for seamonkey

SECUNIA ADVISORY ID:
SA27979

VERIFY ADVISORY:
http://secunia.com/advisories/27979/

CRITICAL:
Highly critical

IMPACT:
Cross Site Scripting, DoS, System access

WHERE:
>From remote

OPERATING SYSTEM:
Fedora 7
http://secunia.com/product/15552/
Fedora 8
http://secunia.com/product/16769/

DESCRIPTION:
Fedora has issued an update for seamonkey. This fixes some
vulnerabilities, which can be exploited by malicious people to
conduct cross-site scripting and cross-site request forgery attacks
and potentially to compromise a user's system.

For more information:
SA27816

SOLUTION:
Apply updated packages.

-- Fedora 7 --

c46a5b083f291e0f8c0883abdfaf03fe5d985951
seamonkey-1.1.7-1.fc7.ppc64.rpm
127dc5f0d9811e6b3719778c5e898414df5d5d98
seamonkey-debuginfo-1.1.7-1.fc7.ppc64.rpm
fde0e13fec433b880ed267f5bd95d6f34e3deb68
seamonkey-debuginfo-1.1.7-1.fc7.i386.rpm
8c69af5292e48e435c85448d01dcba46c9f54c43
seamonkey-1.1.7-1.fc7.i386.rpm
7fd64cc51de038e2fc1589b989e773e48d650499
seamonkey-1.1.7-1.fc7.x86_64.rpm
eb1fd908a746d91ad1de3568d18a3f6f735673f6
seamonkey-debuginfo-1.1.7-1.fc7.x86_64.rpm
da12bc3b281d71a5ba05b9bcdf51900fdd1bd3b3
seamonkey-debuginfo-1.1.7-1.fc7.ppc.rpm
01cccc6cd943929a6c7df1ae29ef4aed5209de7e
seamonkey-1.1.7-1.fc7.ppc.rpm
a6cab9461d6b2941ec60a7f1690a8a04f6f0e2f2
seamonkey-1.1.7-1.fc7.src.rpm

-- Fedora 8 --

0bb8b53a40098142b31bb7d2f7d78009f89dae0e
seamonkey-1.1.7-1.fc8.ppc64.rpm
9c7ac2ab69265b827b1536f26d41dcd00c6b4cff
seamonkey-debuginfo-1.1.7-1.fc8.ppc64.rpm
c3d287ce594ffd4183778c3b64008e9072093a1a
seamonkey-debuginfo-1.1.7-1.fc8.i386.rpm
581b48f6a57004687c42753711f00b0368431c9e
seamonkey-1.1.7-1.fc8.i386.rpm
20e158f810c40c15b1b77f3bc8bbf6e4606cbf75
seamonkey-1.1.7-1.fc8.x86_64.rpm
83add2669c7d80caaf7c73350ce6bd5eab183885
seamonkey-debuginfo-1.1.7-1.fc8.x86_64.rpm
6a340aba1d04c08a68b9aae2a71babc1daf68ead
seamonkey-1.1.7-1.fc8.ppc.rpm
4106a969baebb739f6a43330bdcbcd0fa1284c75
seamonkey-debuginfo-1.1.7-1.fc8.ppc.rpm
d2c36a8117398496c8dd69b03b525044f6aa02b8
seamonkey-1.1.7-1.fc8.src.rpm

ORIGINAL ADVISORY:
https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00135.html
https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00168.html

OTHER REFERENCES:
SA27816:
http://secunia.com/advisories/27816/

----------------------------------------------------------------------

About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.

Subscribe:
http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/


Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.

----------------------------------------------------------------------

Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    0 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    0 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close