Users of SeaMonkey please be advised of a race condition vulnerability that has been identified.
To view this vulnerability, possible remedies, and others please check out the Security Advisories at Critical Watch (http://criticalwatch.com/support/security-advisories.aspx)
Amplify’d from www.criticalwatch.com
RHSA-2010:0810-01: [RHSA-2010:0810-01] seamonkey race condition
Product: Red Hat Enterprise Linux
Description:
SeaMonkey is an open source web browser, email and newsgroup client, IRC
chat client, and HTML editor.
A race condition flaw was found in the way SeaMonkey handled Document
Object Model (DOM) element properties. A web page containing malicious
content could cause SeaMonkey to crash or, potentially, execute arbitrary
code with the privileges of the user running SeaMonkey. (CVE-2010-3765)Read more at www.criticalwatch.com
See this Amp at http://amplify.com/u/e7xg
No comments:
Post a Comment