Bug 530159 (CVE-2009-3385)

Summary: CVE-2009-3385 SeaMonkey scriptable plugin execution in mail (mfsa2010-06)
Product: [Other] Security Response Reporter: Josh Bressers <bressers>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: urgent Docs Contact:
Priority: urgent    
Version: unspecifiedCC: jlieskov, security-response-team, vdanen
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard: impact=critical,source=mozilla,reported=20091021,public=20091027,cvss2=5.8/AV:N/AC:M/Au:N/C:P/I:P/A:N
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2010-04-08 16:33:10 EDT Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---

Description Josh Bressers 2009-10-21 14:16:05 EDT
Mozilla security researcher Georgi Guninski reported that scriptable plugin
content, such as Flash objects, could be loaded and executed in SeaMonkey
mail messages by embedding the content in an iframe inside the message. If
a user were to reply to or forward such a message, malicious JavaScript
embedded in the plugin content could potentially steal the contents of the
message or files from the local filesystem.
Comment 1 Jan Lieskovsky 2010-03-18 09:07:09 EDT
Public now via:
Comment 3 Vincent Danen 2010-04-08 16:33:10 EDT
This issue was corrected in Red Hat Enterprise Linux 3 and 4 via:


as referenced in the seamonkey.spec:

# fixed in
Patch378:      mozilla-371976-x.patch

Which corresponds to the linked mozilla bug in the upstream advisory: https://bugzilla.mozilla.org/show_bug.cgi?id=371976