CWE
416
Advisory Published

RHSA-2009:1432: Critical: seamonkey security update

First published: Wed Sep 09 2009(Updated: )

SeaMonkey is an open source Web browser, email and newsgroup client, IRC<br>chat client, and HTML editor.<br>Several flaws were found in the processing of malformed web content. A web<br>page containing malicious content could cause SeaMonkey to crash or,<br>potentially, execute arbitrary code with the privileges of the user running<br>SeaMonkey. (CVE-2009-3072, CVE-2009-3075)<br>A use-after-free flaw was found in SeaMonkey. An attacker could use this<br>flaw to crash SeaMonkey or, potentially, execute arbitrary code with the<br>privileges of the user running SeaMonkey. (CVE-2009-3077)<br>Dan Kaminsky discovered flaws in the way browsers such as SeaMonkey handle<br>NULL characters in a certificate. If an attacker is able to get a<br>carefully-crafted certificate signed by a Certificate Authority trusted by<br>SeaMonkey, the attacker could use the certificate during a<br>man-in-the-middle attack and potentially confuse SeaMonkey into accepting<br>it by mistake. (CVE-2009-2408)<br>Descriptions in the dialogs when adding and removing PKCS #11 modules were<br>not informative. An attacker able to trick a user into installing a<br>malicious PKCS #11 module could use this flaw to install their own<br>Certificate Authority certificates on a user's machine, making it possible<br>to trick the user into believing they are viewing a trusted site or,<br>potentially, execute arbitrary code with the privileges of the user running<br>SeaMonkey. (CVE-2009-3076)<br>A flaw was found in the way SeaMonkey displays the address bar when<br>window.open() is called in a certain way. An attacker could use this flaw<br>to conceal a malicious URL, possibly tricking a user into believing they<br>are viewing a trusted site. (CVE-2009-2654)<br>Dan Kaminsky found that browsers still accept certificates with MD2 hash<br>signatures, even though MD2 is no longer considered a cryptographically<br>strong algorithm. This could make it easier for an attacker to create a<br>malicious certificate that would be treated as trusted by a browser. NSS<br>(provided by SeaMonkey) now disables the use of MD2 and MD4 algorithms<br>inside signatures by default. (CVE-2009-2409)<br>All SeaMonkey users should upgrade to these updated packages, which correct<br>these issues. After installing the update, SeaMonkey must be restarted for<br>the changes to take effect.

Affected SoftwareAffected VersionHow to fix

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203