Bug 198686 - CVE-2006-2783 multiple Seamonkey issues (CVE-2006-2782,CVE-2006-2778,CVE-2006-2776,CVE-2006-2784,CVE-2006-2785,CVE-2006-2786,CVE-2006-2787,CVE-2006-2788)
Summary: CVE-2006-2783 multiple Seamonkey issues (CVE-2006-2782,CVE-2006-2778,CVE-2006...
Alias: None
Product: Red Hat Enterprise Linux 2.1
Classification: Red Hat
Component: seamonkey   
(Show other bugs)
Version: 2.1
Hardware: All
OS: Linux
Target Milestone: ---
Assignee: Christopher Aillon
QA Contact: Ben Levenson
Whiteboard: impact=moderate,source=mozilla,report...
Keywords: Security
Depends On:
TreeView+ depends on / blocked
Reported: 2006-07-12 19:55 UTC by Josh Bressers
Modified: 2007-11-30 22:06 UTC (History)
0 users

Fixed In Version: RHSA-2006-0594
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Last Closed: 2006-08-28 11:30:33 UTC
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---

Attachments (Terms of Use)

External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2006:0594 normal SHIPPED_LIVE Critical: seamonkey security update (was mozilla) 2006-09-15 13:27:00 UTC

Description Josh Bressers 2006-07-12 19:55:13 UTC
+++ This bug was initially created as a clone of Bug #196971 +++

These issues will remain unfixed in Mozilla until Seamonkey is released.  They
are not additional issues, simply problems which are fixed as part of the upgrade.

CVE-2006-2777 MFSA 2006-43
CVE-2006-2776 MFSA 2006-37
CVE-2006-2784 MFSA 2006-36
CVE-2006-2785 MFSA 2006-34
CVE-2006-2787 MFSA 2006-31
Several flaws were found in the way Mozilla processes certain javascript
actions. A malicious web page could execute arbitrary javascript
instructions with the permissions of "chrome", allowing the page to steal
sensitive information or install browser malware.

CVE-2006-2783 MFSA 2006-42
A cross site scripting flaw was found in the way Mozilla processes Unicode
Byte-order-Mark (BOM) markers in UTF-8 web pages. A malicious web page
could execute a script within the browser that a web input sanitizer could
miss due to a malformed "script" tag.

CVE-2006-2782 MFSA 2006-41
A form file upload flaw was found in the way Mozilla handles javascript
input object mutation. A malicious web page could upload an arbitrary local
file at form submission time without user interaction.

CVE-2006-2778 MFSA 2006-38
A denial of service flaw was found in the way Mozilla calls the
crypto.signText() javascript function. A malicious web page could crash the
browser if the victim had a client certificate loaded.

CVE-2006-2786 MFSA 2006-33
Two HTTP response smuggling flaws were found in the way Mozilla processes
certain invalid HTTP response headers. A malicious web site could return
specially crafted HTTP response headers which may bypass HTTP proxy

A double free flaw was found in the way the nsIX509::getRawDER method is
called. If a victim visits a carefully crafted web page it is possible to
execute arbitrary code as the user running Mozilla. (CVE-2006-2788)

Comment 1 Josh Bressers 2006-07-14 19:58:47 UTC
CVE-2006-2777 is now tracked via bug 198934

Comment 4 Red Hat Bugzilla 2006-08-28 11:30:33 UTC
An advisory has been issued which should help the problem
described in this bug report. This report is therefore being
closed with a resolution of ERRATA. For more information
on the solution and/or where to find the updated files,
please follow the link below. You may reopen this bug report
if the solution does not work for you.


Note You need to log in before you can comment on or make changes to this bug.