Friday, October 29, 2010

SeaMonkey: race condition Vulnerability

Users of SeaMonkey please be advised of a race condition vulnerability that has been identified.

To view this vulnerability, possible remedies, and others please check out the Security Advisories at Critical Watch (http://criticalwatch.com/support/security-advisories.aspx)

Amplify’d from www.criticalwatch.com
RHSA-2010:0810-01: [RHSA-2010:0810-01] seamonkey race condition
Product: Red Hat Enterprise Linux
Description:

SeaMonkey is an open source web browser, email and newsgroup client, IRC
chat client, and HTML editor.

A race condition flaw was found in the way SeaMonkey handled Document
Object Model (DOM) element properties. A web page containing malicious
content could cause SeaMonkey to crash or, potentially, execute arbitrary
code with the privileges of the user running SeaMonkey. (CVE-2010-3765)Read more at www.criticalwatch.com
 

No comments:

Post a Comment