Skip to navigation

Security Advisory seamonkey security update

Advisory: RHSA-2006:0609-9
Type: Security Advisory
Severity: Critical
Issued on: 2006-08-02
Last updated on: 2006-08-02
Affected Products: Red Hat Desktop (v. 4)
Red Hat Enterprise Linux AS (v. 4)
Red Hat Enterprise Linux ES (v. 4)
Red Hat Enterprise Linux WS (v. 4)
CVEs (cve.mitre.org): CVE-2006-2776
CVE-2006-2778
CVE-2006-2779
CVE-2006-2780
CVE-2006-2781
CVE-2006-2782
CVE-2006-2783
CVE-2006-2784
CVE-2006-2785
CVE-2006-2786
CVE-2006-2787
CVE-2006-2788
CVE-2006-3113
CVE-2006-3677
CVE-2006-3801
CVE-2006-3802
CVE-2006-3803
CVE-2006-3804
CVE-2006-3805
CVE-2006-3806
CVE-2006-3807
CVE-2006-3808
CVE-2006-3809
CVE-2006-3810
CVE-2006-3811
CVE-2006-3812

Details

Updated seamonkey packages that fix several security bugs in the mozilla
package are now available for Red Hat Enterprise Linux 4.

This update has been rated as having critical security impact by the Red
Hat Security Response Team.

Seamonkey is an open source Web browser, advanced email and newsgroup
client, IRC chat client, and HTML editor.

The Mozilla Foundation has discontinued support for the Mozilla Suite. This
update deprecates the Mozilla Suite in Red Hat Enterprise Linux 4 in
favor of the supported Seamonkey Suite.

This update also resolves a number of outstanding Mozilla security issues:

Several flaws were found in the way Seamonkey processed certain javascript
actions. A malicious web page could execute arbitrary javascript
instructions with the permissions of "chrome", allowing the page to steal
sensitive information or install browser malware. (CVE-2006-2776,
CVE-2006-2784, CVE-2006-2785, CVE-2006-2787, CVE-2006-3807, CVE-2006-3809,
CVE-2006-3812)

Several denial of service flaws were found in the way Seamonkey processed
certain web content. A malicious web page could crash the browser or
possibly execute arbitrary code as the user running Seamonkey.
(CVE-2006-2779, CVE-2006-2780, CVE-2006-3801, CVE-2006-3677, CVE-2006-3113,
CVE-2006-3803, CVE-2006-3805, CVE-2006-3806, CVE-2006-3811)

Two flaws were found in the way Seamonkey-mail displayed malformed
inline vcard attachments. If a victim viewed an email message containing
a carefully crafted vcard it was possible to execute arbitrary code as the
user running Mozilla-mail. (CVE-2006-2781, CVE-2006-3804)

A cross-site scripting flaw was found in the way Seamonkey processed
Unicode Byte-Order-Mark (BOM) markers in UTF-8 web pages. A malicious web
page could execute a script within the browser that a web input sanitizer
could miss due to a malformed "script" tag. (CVE-2006-2783)

Several flaws were found in the way Seamonkey processed certain javascript
actions. A malicious web page could conduct a cross-site scripting attack
or steal sensitive information (such as cookies owned by other domains).
(CVE-2006-3802, CVE-2006-3810)

A form file upload flaw was found in the way Seamonkey handled javascript
input object mutation. A malicious web page could upload an arbitrary local
file at form submission time without user interaction. (CVE-2006-2782)

A denial of service flaw was found in the way Seamonkey called the
crypto.signText() javascript function. A malicious web page could crash the
browser if the victim had a client certificate loaded. (CVE-2006-2778)

Two HTTP response smuggling flaws were found in the way Seamonkey processed
certain invalid HTTP response headers. A malicious web site could return
specially crafted HTTP response headers which may bypass HTTP proxy
restrictions. (CVE-2006-2786)

A flaw was found in the way Seamonkey processed Proxy AutoConfig scripts. A
malicious Proxy AutoConfig server could execute arbitrary javascript
instructions with the permissions of "chrome", allowing the page to steal
sensitive information or install browser malware. (CVE-2006-3808)

A double free flaw was found in the way the nsIX509::getRawDER method was
called. If a victim visited a carefully crafted web page, it was possible
to execute arbitrary code as the user running Mozilla. (CVE-2006-2788)

Users of Mozilla are advised to upgrade to this update, which contains
Seamonkey version 1.0.3 that corrects these issues.


Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

This update is available via Red Hat Network. To use Red Hat Network,
launch the Red Hat Update Agent with the following command:

up2date

This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.

Multilib systems may experience difficulty if trying to specify the package
by name to the Update Agent via a command line argument. This can be
solved by executing the following commands:

up2date seamonkey; up2date seamonkey-nss seamonkey-nspr

Updated packages

Red Hat Desktop (v. 4)

IA-32:
devhelp-0.10-0.2.el4.i386.rpm
File outdated by:  RHSA-2008:0882
    MD5: 2b610d66be90a961df9576b730fe0dd5
devhelp-devel-0.10-0.2.el4.i386.rpm
File outdated by:  RHSA-2008:0882
    MD5: 8f140663a5fc3619fe0947c3e337d258
seamonkey-1.0.3-0.el4.1.i386.rpm
File outdated by:  RHSA-2012:0141
    MD5: aa9b4a1459c06af74b9be48aeba05fbf
seamonkey-chat-1.0.3-0.el4.1.i386.rpm
File outdated by:  RHSA-2012:0141
    MD5: 9231e7136155bcd36ed71d5022658a05
seamonkey-devel-1.0.3-0.el4.1.i386.rpm
File outdated by:  RHSA-2012:0141
    MD5: 80cdfafeb48488cbdc69a2164f98e576
seamonkey-dom-inspector-1.0.3-0.el4.1.i386.rpm
File outdated by:  RHSA-2012:0141
    MD5: d3c23f42ae4873b9a41324f28e968eb0
seamonkey-js-debugger-1.0.3-0.el4.1.i386.rpm
File outdated by:  RHSA-2012:0141
    MD5: e3dfbb1638d500f38699bc5c2caee973
seamonkey-mail-1.0.3-0.el4.1.i386.rpm
File outdated by:  RHSA-2012:0141
    MD5: 2a24919342ceb4b57e81da4eacb3836f
seamonkey-nspr-1.0.3-0.el4.1.i386.rpm
File outdated by:  RHSA-2008:0599
    MD5: badf4579aec71e1216a7dea4f3225dd8
seamonkey-nspr-devel-1.0.3-0.el4.1.i386.rpm
File outdated by:  RHSA-2008:0599
    MD5: 633ec311338de310000fc1e101813def
seamonkey-nss-1.0.3-0.el4.1.i386.rpm
File outdated by:  RHSA-2008:0599
    MD5: e1da531258c215ba19c9fac2bade1a8d
seamonkey-nss-devel-1.0.3-0.el4.1.i386.rpm
File outdated by:  RHSA-2008:0599
    MD5: 9d3859b3751793e0c561b5f6a68223f1
 
x86_64:
devhelp-0.10-0.2.el4.x86_64.rpm
File outdated by:  RHSA-2008:0882
    MD5: 59d454bf49b46fdb008807197d9a21c6
devhelp-devel-0.10-0.2.el4.x86_64.rpm
File outdated by:  RHSA-2008:0882
    MD5: c6b70818592db069d0030996b1934ce2
seamonkey-1.0.3-0.el4.1.x86_64.rpm
File outdated by:  RHSA-2012:0141
    MD5: 923f63ff635f39f3dec84d6ce147cf4f
seamonkey-chat-1.0.3-0.el4.1.x86_64.rpm
File outdated by:  RHSA-2012:0141
    MD5: ffc2f853ccca20da31cae100ce7daba0
seamonkey-devel-1.0.3-0.el4.1.x86_64.rpm
File outdated by:  RHSA-2012:0141
    MD5: 101d537bac1b81447399b02441f2475a
seamonkey-dom-inspector-1.0.3-0.el4.1.x86_64.rpm
File outdated by:  RHSA-2012:0141
    MD5: 40669632cd547920031c8f8808273857
seamonkey-js-debugger-1.0.3-0.el4.1.x86_64.rpm
File outdated by:  RHSA-2012:0141
    MD5: abbe20af3b0060d004639d62851f0c4b
seamonkey-mail-1.0.3-0.el4.1.x86_64.rpm
File outdated by:  RHSA-2012:0141
    MD5: 0102ab137a0b007cf4e04de241c35ea6
seamonkey-nspr-1.0.3-0.el4.1.i386.rpm
File outdated by:  RHSA-2008:0599
    MD5: badf4579aec71e1216a7dea4f3225dd8
seamonkey-nspr-1.0.3-0.el4.1.x86_64.rpm
File outdated by:  RHSA-2008:0599
    MD5: 051573bd008f1b0760cdc697deef9bfa
seamonkey-nspr-devel-1.0.3-0.el4.1.x86_64.rpm
File outdated by:  RHSA-2008:0599
    MD5: f277f96c3241c4e966087f16c8c76787
seamonkey-nss-1.0.3-0.el4.1.i386.rpm
File outdated by:  RHSA-2008:0599
    MD5: e1da531258c215ba19c9fac2bade1a8d
seamonkey-nss-1.0.3-0.el4.1.x86_64.rpm
File outdated by:  RHSA-2008:0599
    MD5: 4b784207b9a7e27d8cab465e7950f664
seamonkey-nss-devel-1.0.3-0.el4.1.x86_64.rpm
File outdated by:  RHSA-2008:0599
    MD5: 7b2f9b3ed7c6740116d65d3531171644
 
Red Hat Enterprise Linux AS (v. 4)

IA-32:
devhelp-0.10-0.2.el4.i386.rpm
File outdated by:  RHSA-2008:0882
    MD5: 2b610d66be90a961df9576b730fe0dd5
devhelp-devel-0.10-0.2.el4.i386.rpm
File outdated by:  RHSA-2008:0882
    MD5: 8f140663a5fc3619fe0947c3e337d258
seamonkey-1.0.3-0.el4.1.i386.rpm
File outdated by:  RHSA-2012:0141
    MD5: aa9b4a1459c06af74b9be48aeba05fbf
seamonkey-chat-1.0.3-0.el4.1.i386.rpm
File outdated by:  RHSA-2012:0141
    MD5: 9231e7136155bcd36ed71d5022658a05
seamonkey-devel-1.0.3-0.el4.1.i386.rpm
File outdated by:  RHSA-2012:0141
    MD5: 80cdfafeb48488cbdc69a2164f98e576
seamonkey-dom-inspector-1.0.3-0.el4.1.i386.rpm
File outdated by:  RHSA-2012:0141
    MD5: d3c23f42ae4873b9a41324f28e968eb0
seamonkey-js-debugger-1.0.3-0.el4.1.i386.rpm
File outdated by:  RHSA-2012:0141
    MD5: e3dfbb1638d500f38699bc5c2caee973
seamonkey-mail-1.0.3-0.el4.1.i386.rpm
File outdated by:  RHSA-2012:0141
    MD5: 2a24919342ceb4b57e81da4eacb3836f
seamonkey-nspr-1.0.3-0.el4.1.i386.rpm
File outdated by:  RHSA-2008:0599
    MD5: badf4579aec71e1216a7dea4f3225dd8
seamonkey-nspr-devel-1.0.3-0.el4.1.i386.rpm
File outdated by:  RHSA-2008:0599
    MD5: 633ec311338de310000fc1e101813def
seamonkey-nss-1.0.3-0.el4.1.i386.rpm
File outdated by:  RHSA-2008:0599
    MD5: e1da531258c215ba19c9fac2bade1a8d
seamonkey-nss-devel-1.0.3-0.el4.1.i386.rpm
File outdated by:  RHSA-2008:0599
    MD5: 9d3859b3751793e0c561b5f6a68223f1
 
IA-64:
seamonkey-1.0.3-0.el4.1.ia64.rpm
File outdated by:  RHSA-2012:0141
    MD5: 6e3be4099ed89be727c51b58600cc199
seamonkey-chat-1.0.3-0.el4.1.ia64.rpm
File outdated by:  RHSA-2012:0141
    MD5: 58fcc24b253d6c99c961b44483ae754a
seamonkey-devel-1.0.3-0.el4.1.ia64.rpm
File outdated by:  RHSA-2012:0141
    MD5: 69ddcf96eca8905e23d7ea9879b581f5
seamonkey-dom-inspector-1.0.3-0.el4.1.ia64.rpm
File outdated by:  RHSA-2012:0141
    MD5: 10e4e1281e64d05009713111260aa051
seamonkey-js-debugger-1.0.3-0.el4.1.ia64.rpm
File outdated by:  RHSA-2012:0141
    MD5: 153e5eea8a4b6a25dbf5184b4978c4cc
seamonkey-mail-1.0.3-0.el4.1.ia64.rpm
File outdated by:  RHSA-2012:0141
    MD5: e7a4a10521d2d49854fba136ebbd24a6
seamonkey-nspr-1.0.3-0.el4.1.i386.rpm
File outdated by:  RHSA-2008:0599
    MD5: badf4579aec71e1216a7dea4f3225dd8
seamonkey-nspr-1.0.3-0.el4.1.ia64.rpm
File outdated by:  RHSA-2008:0599
    MD5: 3e90039c4b98c3392a474fe61463cefb
seamonkey-nspr-devel-1.0.3-0.el4.1.ia64.rpm
File outdated by:  RHSA-2008:0599
    MD5: 0b2bb28deed316aa166ec75f4b8a368f
seamonkey-nss-1.0.3-0.el4.1.i386.rpm
File outdated by:  RHSA-2008:0599
    MD5: e1da531258c215ba19c9fac2bade1a8d
seamonkey-nss-1.0.3-0.el4.1.ia64.rpm
File outdated by:  RHSA-2008:0599
    MD5: 69a89266358ed2575daffe261e5b6228
seamonkey-nss-devel-1.0.3-0.el4.1.ia64.rpm
File outdated by:  RHSA-2008:0599
    MD5: 198e4c7c9046aa8127d02bf48dd7d41a
 
PPC:
devhelp-0.10-0.2.el4.ppc.rpm
File outdated by:  RHSA-2008:0882
    MD5: ecbc0bf8ebd4955de0bc17df53df3a77
devhelp-devel-0.10-0.2.el4.ppc.rpm
File outdated by:  RHSA-2008:0882
    MD5: 4bf5630fbc87766640ef255c7de9f1c8
seamonkey-1.0.3-0.el4.1.ppc.rpm
File outdated by:  RHSA-2012:0141
    MD5: 9fa4c907f81d3be0776e232bd0e78802
seamonkey-chat-1.0.3-0.el4.1.ppc.rpm
File outdated by:  RHSA-2012:0141
    MD5: 77b514da18394d60fd1c245308fe10fb
seamonkey-devel-1.0.3-0.el4.1.ppc.rpm
File outdated by:  RHSA-2012:0141
    MD5: 12f70a1ac7e3b5d0ef48db778eae9035
seamonkey-dom-inspector-1.0.3-0.el4.1.ppc.rpm
File outdated by:  RHSA-2012:0141
    MD5: 3e4a0728bcb94a50a7568b0aad860d7e
seamonkey-js-debugger-1.0.3-0.el4.1.ppc.rpm
File outdated by:  RHSA-2012:0141
    MD5: 7309fb85809c20a4c5aef8df9d543186
seamonkey-mail-1.0.3-0.el4.1.ppc.rpm
File outdated by:  RHSA-2012:0141
    MD5: 8c552b2bd18356805687854876a69b49
seamonkey-nspr-1.0.3-0.el4.1.ppc.rpm
File outdated by:  RHSA-2008:0599
    MD5: c8e9a6a8cd022f4a00cd9a4b0bc34cbb
seamonkey-nspr-devel-1.0.3-0.el4.1.ppc.rpm
File outdated by:  RHSA-2008:0599
    MD5: 9ee1d7458ce34620f37c0aa54b97fb93
seamonkey-nss-1.0.3-0.el4.1.ppc.rpm
File outdated by:  RHSA-2008:0599
    MD5: 61034fd7c95adbcfee3827c3804d9039
seamonkey-nss-devel-1.0.3-0.el4.1.ppc.rpm
File outdated by:  RHSA-2008:0599
    MD5: 96ea8c56e45687e59cc02ac32c509c56
 
s390:
seamonkey-1.0.3-0.el4.1.s390.rpm
File outdated by:  RHSA-2012:0141
    MD5: 5abc6a7650eb7c49e1f385e9dbcb56b6
seamonkey-chat-1.0.3-0.el4.1.s390.rpm
File outdated by:  RHSA-2012:0141
    MD5: 2e0cd5ff34ee4606f1515ab6bba576c8
seamonkey-devel-1.0.3-0.el4.1.s390.rpm
File outdated by:  RHSA-2012:0141
    MD5: 3b4b987775aa7300e95a2a9bbf81fe0d
seamonkey-dom-inspector-1.0.3-0.el4.1.s390.rpm
File outdated by:  RHSA-2012:0141
    MD5: ec39d60608ad39db085a5fbc17bddf24
seamonkey-js-debugger-1.0.3-0.el4.1.s390.rpm
File outdated by:  RHSA-2012:0141
    MD5: d343b26ae94a66c2fd3a68b1676b294e
seamonkey-mail-1.0.3-0.el4.1.s390.rpm
File outdated by:  RHSA-2012:0141
    MD5: 9c46acbfdd75a005e77547f8635ee6ac
seamonkey-nspr-1.0.3-0.el4.1.s390.rpm
File outdated by:  RHSA-2008:0599
    MD5: 64c81ebb81a71028aeee1e205244c389
seamonkey-nspr-devel-1.0.3-0.el4.1.s390.rpm
File outdated by:  RHSA-2008:0599
    MD5: 05f4801adb155a509f38cd8c3420cf27
seamonkey-nss-1.0.3-0.el4.1.s390.rpm
File outdated by:  RHSA-2008:0599
    MD5: 0f56e9682f6009136f46c292e0b5b223
seamonkey-nss-devel-1.0.3-0.el4.1.s390.rpm
File outdated by:  RHSA-2008:0599
    MD5: 133f662802d718c7e0b1abe4f1dae342
 
s390x:
seamonkey-1.0.3-0.el4.1.s390x.rpm
File outdated by:  RHSA-2012:0141
    MD5: 240b06512673c5cd9e37a05bae44f291
seamonkey-chat-1.0.3-0.el4.1.s390x.rpm
File outdated by:  RHSA-2012:0141
    MD5: 36617a7b7729706bc9c46abe3c1185d2
seamonkey-devel-1.0.3-0.el4.1.s390x.rpm
File outdated by:  RHSA-2012:0141
    MD5: 3917277ef13bfd2d2a0d685f111337de
seamonkey-dom-inspector-1.0.3-0.el4.1.s390x.rpm
File outdated by:  RHSA-2012:0141
    MD5: b17497777d709c6b3660585f85fa78f0
seamonkey-js-debugger-1.0.3-0.el4.1.s390x.rpm
File outdated by:  RHSA-2012:0141
    MD5: 5ba8f6d12e4d363b4d3995c252593c96
seamonkey-mail-1.0.3-0.el4.1.s390x.rpm
File outdated by:  RHSA-2012:0141
    MD5: 7e6a97f1944ef2c92023e93cddcb2929
seamonkey-nspr-1.0.3-0.el4.1.s390.rpm
File outdated by:  RHSA-2008:0599
    MD5: 64c81ebb81a71028aeee1e205244c389
seamonkey-nspr-1.0.3-0.el4.1.s390x.rpm
File outdated by:  RHSA-2008:0599
    MD5: e41ebbbd54a454c831c3d15898484a79
seamonkey-nspr-devel-1.0.3-0.el4.1.s390x.rpm
File outdated by:  RHSA-2008:0599
    MD5: 5fa0cff491049a643f331ef8c84c87f2
seamonkey-nss-1.0.3-0.el4.1.s390.rpm
File outdated by:  RHSA-2008:0599
    MD5: 0f56e9682f6009136f46c292e0b5b223
seamonkey-nss-1.0.3-0.el4.1.s390x.rpm
File outdated by:  RHSA-2008:0599
    MD5: 5239a9be25545af9b1bec84785909be7
seamonkey-nss-devel-1.0.3-0.el4.1.s390x.rpm
File outdated by:  RHSA-2008:0599
    MD5: 450ec553de39365848969de31cf29aa8
 
x86_64:
devhelp-0.10-0.2.el4.x86_64.rpm
File outdated by:  RHSA-2008:0882
    MD5: 59d454bf49b46fdb008807197d9a21c6
devhelp-devel-0.10-0.2.el4.x86_64.rpm
File outdated by:  RHSA-2008:0882
    MD5: c6b70818592db069d0030996b1934ce2
seamonkey-1.0.3-0.el4.1.x86_64.rpm
File outdated by:  RHSA-2012:0141
    MD5: 923f63ff635f39f3dec84d6ce147cf4f
seamonkey-chat-1.0.3-0.el4.1.x86_64.rpm
File outdated by:  RHSA-2012:0141
    MD5: ffc2f853ccca20da31cae100ce7daba0
seamonkey-devel-1.0.3-0.el4.1.x86_64.rpm
File outdated by:  RHSA-2012:0141
    MD5: 101d537bac1b81447399b02441f2475a
seamonkey-dom-inspector-1.0.3-0.el4.1.x86_64.rpm
File outdated by:  RHSA-2012:0141
    MD5: 40669632cd547920031c8f8808273857
seamonkey-js-debugger-1.0.3-0.el4.1.x86_64.rpm
File outdated by:  RHSA-2012:0141
    MD5: abbe20af3b0060d004639d62851f0c4b
seamonkey-mail-1.0.3-0.el4.1.x86_64.rpm
File outdated by:  RHSA-2012:0141
    MD5: 0102ab137a0b007cf4e04de241c35ea6
seamonkey-nspr-1.0.3-0.el4.1.i386.rpm
File outdated by:  RHSA-2008:0599
    MD5: badf4579aec71e1216a7dea4f3225dd8
seamonkey-nspr-1.0.3-0.el4.1.x86_64.rpm
File outdated by:  RHSA-2008:0599
    MD5: 051573bd008f1b0760cdc697deef9bfa
seamonkey-nspr-devel-1.0.3-0.el4.1.x86_64.rpm
File outdated by:  RHSA-2008:0599
    MD5: f277f96c3241c4e966087f16c8c76787
seamonkey-nss-1.0.3-0.el4.1.i386.rpm
File outdated by:  RHSA-2008:0599
    MD5: e1da531258c215ba19c9fac2bade1a8d
seamonkey-nss-1.0.3-0.el4.1.x86_64.rpm
File outdated by:  RHSA-2008:0599
    MD5: 4b784207b9a7e27d8cab465e7950f664
seamonkey-nss-devel-1.0.3-0.el4.1.x86_64.rpm
File outdated by:  RHSA-2008:0599
    MD5: 7b2f9b3ed7c6740116d65d3531171644
 
Red Hat Enterprise Linux ES (v. 4)

IA-32:
devhelp-0.10-0.2.el4.i386.rpm
File outdated by:  RHSA-2008:0882
    MD5: 2b610d66be90a961df9576b730fe0dd5
devhelp-devel-0.10-0.2.el4.i386.rpm
File outdated by:  RHSA-2008:0882
    MD5: 8f140663a5fc3619fe0947c3e337d258
seamonkey-1.0.3-0.el4.1.i386.rpm
File outdated by:  RHSA-2012:0141
    MD5: aa9b4a1459c06af74b9be48aeba05fbf
seamonkey-chat-1.0.3-0.el4.1.i386.rpm
File outdated by:  RHSA-2012:0141
    MD5: 9231e7136155bcd36ed71d5022658a05
seamonkey-devel-1.0.3-0.el4.1.i386.rpm
File outdated by:  RHSA-2012:0141
    MD5: 80cdfafeb48488cbdc69a2164f98e576
seamonkey-dom-inspector-1.0.3-0.el4.1.i386.rpm
File outdated by:  RHSA-2012:0141
    MD5: d3c23f42ae4873b9a41324f28e968eb0
seamonkey-js-debugger-1.0.3-0.el4.1.i386.rpm
File outdated by:  RHSA-2012:0141
    MD5: e3dfbb1638d500f38699bc5c2caee973
seamonkey-mail-1.0.3-0.el4.1.i386.rpm
File outdated by:  RHSA-2012:0141
    MD5: 2a24919342ceb4b57e81da4eacb3836f
seamonkey-nspr-1.0.3-0.el4.1.i386.rpm
File outdated by:  RHSA-2008:0599
    MD5: badf4579aec71e1216a7dea4f3225dd8
seamonkey-nspr-devel-1.0.3-0.el4.1.i386.rpm
File outdated by:  RHSA-2008:0599
    MD5: 633ec311338de310000fc1e101813def
seamonkey-nss-1.0.3-0.el4.1.i386.rpm
File outdated by:  RHSA-2008:0599
    MD5: e1da531258c215ba19c9fac2bade1a8d
seamonkey-nss-devel-1.0.3-0.el4.1.i386.rpm
File outdated by:  RHSA-2008:0599
    MD5: 9d3859b3751793e0c561b5f6a68223f1
 
IA-64:
seamonkey-1.0.3-0.el4.1.ia64.rpm
File outdated by:  RHSA-2012:0141
    MD5: 6e3be4099ed89be727c51b58600cc199
seamonkey-chat-1.0.3-0.el4.1.ia64.rpm
File outdated by:  RHSA-2012:0141
    MD5: 58fcc24b253d6c99c961b44483ae754a
seamonkey-devel-1.0.3-0.el4.1.ia64.rpm
File outdated by:  RHSA-2012:0141
    MD5: 69ddcf96eca8905e23d7ea9879b581f5
seamonkey-dom-inspector-1.0.3-0.el4.1.ia64.rpm
File outdated by:  RHSA-2012:0141
    MD5: 10e4e1281e64d05009713111260aa051
seamonkey-js-debugger-1.0.3-0.el4.1.ia64.rpm
File outdated by:  RHSA-2012:0141
    MD5: 153e5eea8a4b6a25dbf5184b4978c4cc
seamonkey-mail-1.0.3-0.el4.1.ia64.rpm
File outdated by:  RHSA-2012:0141
    MD5: e7a4a10521d2d49854fba136ebbd24a6
seamonkey-nspr-1.0.3-0.el4.1.i386.rpm
File outdated by:  RHSA-2008:0599
    MD5: badf4579aec71e1216a7dea4f3225dd8
seamonkey-nspr-1.0.3-0.el4.1.ia64.rpm
File outdated by:  RHSA-2008:0599
    MD5: 3e90039c4b98c3392a474fe61463cefb
seamonkey-nspr-devel-1.0.3-0.el4.1.ia64.rpm
File outdated by:  RHSA-2008:0599
    MD5: 0b2bb28deed316aa166ec75f4b8a368f
seamonkey-nss-1.0.3-0.el4.1.i386.rpm
File outdated by:  RHSA-2008:0599
    MD5: e1da531258c215ba19c9fac2bade1a8d
seamonkey-nss-1.0.3-0.el4.1.ia64.rpm
File outdated by:  RHSA-2008:0599
    MD5: 69a89266358ed2575daffe261e5b6228
seamonkey-nss-devel-1.0.3-0.el4.1.ia64.rpm
File outdated by:  RHSA-2008:0599
    MD5: 198e4c7c9046aa8127d02bf48dd7d41a
 
x86_64:
devhelp-0.10-0.2.el4.x86_64.rpm
File outdated by:  RHSA-2008:0882
    MD5: 59d454bf49b46fdb008807197d9a21c6
devhelp-devel-0.10-0.2.el4.x86_64.rpm
File outdated by:  RHSA-2008:0882
    MD5: c6b70818592db069d0030996b1934ce2
seamonkey-1.0.3-0.el4.1.x86_64.rpm
File outdated by:  RHSA-2012:0141
    MD5: 923f63ff635f39f3dec84d6ce147cf4f
seamonkey-chat-1.0.3-0.el4.1.x86_64.rpm
File outdated by:  RHSA-2012:0141
    MD5: ffc2f853ccca20da31cae100ce7daba0
seamonkey-devel-1.0.3-0.el4.1.x86_64.rpm
File outdated by:  RHSA-2012:0141
    MD5: 101d537bac1b81447399b02441f2475a
seamonkey-dom-inspector-1.0.3-0.el4.1.x86_64.rpm
File outdated by:  RHSA-2012:0141
    MD5: 40669632cd547920031c8f8808273857
seamonkey-js-debugger-1.0.3-0.el4.1.x86_64.rpm
File outdated by:  RHSA-2012:0141
    MD5: abbe20af3b0060d004639d62851f0c4b
seamonkey-mail-1.0.3-0.el4.1.x86_64.rpm
File outdated by:  RHSA-2012:0141
    MD5: 0102ab137a0b007cf4e04de241c35ea6
seamonkey-nspr-1.0.3-0.el4.1.i386.rpm
File outdated by:  RHSA-2008:0599
    MD5: badf4579aec71e1216a7dea4f3225dd8
seamonkey-nspr-1.0.3-0.el4.1.x86_64.rpm
File outdated by:  RHSA-2008:0599
    MD5: 051573bd008f1b0760cdc697deef9bfa
seamonkey-nspr-devel-1.0.3-0.el4.1.x86_64.rpm
File outdated by:  RHSA-2008:0599
    MD5: f277f96c3241c4e966087f16c8c76787
seamonkey-nss-1.0.3-0.el4.1.i386.rpm
File outdated by:  RHSA-2008:0599
    MD5: e1da531258c215ba19c9fac2bade1a8d
seamonkey-nss-1.0.3-0.el4.1.x86_64.rpm
File outdated by:  RHSA-2008:0599
    MD5: 4b784207b9a7e27d8cab465e7950f664
seamonkey-nss-devel-1.0.3-0.el4.1.x86_64.rpm
File outdated by:  RHSA-2008:0599
    MD5: 7b2f9b3ed7c6740116d65d3531171644
 
Red Hat Enterprise Linux WS (v. 4)

IA-32:
devhelp-0.10-0.2.el4.i386.rpm
File outdated by:  RHSA-2008:0882
    MD5: 2b610d66be90a961df9576b730fe0dd5
devhelp-devel-0.10-0.2.el4.i386.rpm
File outdated by:  RHSA-2008:0882
    MD5: 8f140663a5fc3619fe0947c3e337d258
seamonkey-1.0.3-0.el4.1.i386.rpm
File outdated by:  RHSA-2012:0141
    MD5: aa9b4a1459c06af74b9be48aeba05fbf
seamonkey-chat-1.0.3-0.el4.1.i386.rpm
File outdated by:  RHSA-2012:0141
    MD5: 9231e7136155bcd36ed71d5022658a05
seamonkey-devel-1.0.3-0.el4.1.i386.rpm
File outdated by:  RHSA-2012:0141
    MD5: 80cdfafeb48488cbdc69a2164f98e576
seamonkey-dom-inspector-1.0.3-0.el4.1.i386.rpm
File outdated by:  RHSA-2012:0141
    MD5: d3c23f42ae4873b9a41324f28e968eb0
seamonkey-js-debugger-1.0.3-0.el4.1.i386.rpm
File outdated by:  RHSA-2012:0141
    MD5: e3dfbb1638d500f38699bc5c2caee973
seamonkey-mail-1.0.3-0.el4.1.i386.rpm
File outdated by:  RHSA-2012:0141
    MD5: 2a24919342ceb4b57e81da4eacb3836f
seamonkey-nspr-1.0.3-0.el4.1.i386.rpm
File outdated by:  RHSA-2008:0599
    MD5: badf4579aec71e1216a7dea4f3225dd8
seamonkey-nspr-devel-1.0.3-0.el4.1.i386.rpm
File outdated by:  RHSA-2008:0599
    MD5: 633ec311338de310000fc1e101813def
seamonkey-nss-1.0.3-0.el4.1.i386.rpm
File outdated by:  RHSA-2008:0599
    MD5: e1da531258c215ba19c9fac2bade1a8d
seamonkey-nss-devel-1.0.3-0.el4.1.i386.rpm
File outdated by:  RHSA-2008:0599
    MD5: 9d3859b3751793e0c561b5f6a68223f1
 
IA-64:
seamonkey-1.0.3-0.el4.1.ia64.rpm
File outdated by:  RHSA-2012:0141
    MD5: 6e3be4099ed89be727c51b58600cc199
seamonkey-chat-1.0.3-0.el4.1.ia64.rpm
File outdated by:  RHSA-2012:0141
    MD5: 58fcc24b253d6c99c961b44483ae754a
seamonkey-devel-1.0.3-0.el4.1.ia64.rpm
File outdated by:  RHSA-2012:0141
    MD5: 69ddcf96eca8905e23d7ea9879b581f5
seamonkey-dom-inspector-1.0.3-0.el4.1.ia64.rpm
File outdated by:  RHSA-2012:0141
    MD5: 10e4e1281e64d05009713111260aa051
seamonkey-js-debugger-1.0.3-0.el4.1.ia64.rpm
File outdated by:  RHSA-2012:0141
    MD5: 153e5eea8a4b6a25dbf5184b4978c4cc
seamonkey-mail-1.0.3-0.el4.1.ia64.rpm
File outdated by:  RHSA-2012:0141
    MD5: e7a4a10521d2d49854fba136ebbd24a6
seamonkey-nspr-1.0.3-0.el4.1.i386.rpm
File outdated by:  RHSA-2008:0599
    MD5: badf4579aec71e1216a7dea4f3225dd8
seamonkey-nspr-1.0.3-0.el4.1.ia64.rpm
File outdated by:  RHSA-2008:0599
    MD5: 3e90039c4b98c3392a474fe61463cefb
seamonkey-nspr-devel-1.0.3-0.el4.1.ia64.rpm
File outdated by:  RHSA-2008:0599
    MD5: 0b2bb28deed316aa166ec75f4b8a368f
seamonkey-nss-1.0.3-0.el4.1.i386.rpm
File outdated by:  RHSA-2008:0599
    MD5: e1da531258c215ba19c9fac2bade1a8d
seamonkey-nss-1.0.3-0.el4.1.ia64.rpm
File outdated by:  RHSA-2008:0599
    MD5: 69a89266358ed2575daffe261e5b6228
seamonkey-nss-devel-1.0.3-0.el4.1.ia64.rpm
File outdated by:  RHSA-2008:0599
    MD5: 198e4c7c9046aa8127d02bf48dd7d41a
 
x86_64:
devhelp-0.10-0.2.el4.x86_64.rpm
File outdated by:  RHSA-2008:0882
    MD5: 59d454bf49b46fdb008807197d9a21c6
devhelp-devel-0.10-0.2.el4.x86_64.rpm
File outdated by:  RHSA-2008:0882
    MD5: c6b70818592db069d0030996b1934ce2
seamonkey-1.0.3-0.el4.1.x86_64.rpm
File outdated by:  RHSA-2012:0141
    MD5: 923f63ff635f39f3dec84d6ce147cf4f
seamonkey-chat-1.0.3-0.el4.1.x86_64.rpm
File outdated by:  RHSA-2012:0141
    MD5: ffc2f853ccca20da31cae100ce7daba0
seamonkey-devel-1.0.3-0.el4.1.x86_64.rpm
File outdated by:  RHSA-2012:0141
    MD5: 101d537bac1b81447399b02441f2475a
seamonkey-dom-inspector-1.0.3-0.el4.1.x86_64.rpm
File outdated by:  RHSA-2012:0141
    MD5: 40669632cd547920031c8f8808273857
seamonkey-js-debugger-1.0.3-0.el4.1.x86_64.rpm
File outdated by:  RHSA-2012:0141
    MD5: abbe20af3b0060d004639d62851f0c4b
seamonkey-mail-1.0.3-0.el4.1.x86_64.rpm
File outdated by:  RHSA-2012:0141
    MD5: 0102ab137a0b007cf4e04de241c35ea6
seamonkey-nspr-1.0.3-0.el4.1.i386.rpm
File outdated by:  RHSA-2008:0599
    MD5: badf4579aec71e1216a7dea4f3225dd8
seamonkey-nspr-1.0.3-0.el4.1.x86_64.rpm
File outdated by:  RHSA-2008:0599
    MD5: 051573bd008f1b0760cdc697deef9bfa
seamonkey-nspr-devel-1.0.3-0.el4.1.x86_64.rpm
File outdated by:  RHSA-2008:0599
    MD5: f277f96c3241c4e966087f16c8c76787
seamonkey-nss-1.0.3-0.el4.1.i386.rpm
File outdated by:  RHSA-2008:0599
    MD5: e1da531258c215ba19c9fac2bade1a8d
seamonkey-nss-1.0.3-0.el4.1.x86_64.rpm
File outdated by:  RHSA-2008:0599
    MD5: 4b784207b9a7e27d8cab465e7950f664
seamonkey-nss-devel-1.0.3-0.el4.1.x86_64.rpm
File outdated by:  RHSA-2008:0599
    MD5: 7b2f9b3ed7c6740116d65d3531171644
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

193906 - CVE-2006-2779 Multiple Mozilla issues (CVE-2006-2780, CVE-2006-2781)
196969 - CVE-2006-2783 multiple Seamonkey issues (CVE-2006-2782,CVE-2006-2778,CVE-2006-2776,CVE-2006-2784,CVE-2006-2785,CVE-2006-2786,CVE-2006-2787,CVE-2006-2788)
200161 - CVE-2006-3801 Multiple Seamonkey issues (CVE-2006-3677, CVE-2006-3113, CVE-2006-3802, CVE-2006-3803, CVE-2006-3804, CVE-2006-3805, CVE-2006-3806, CVE-2006-3807, CVE-2006-3808, CVE-2006-3809, CVE-2006-3810, CVE-2006-3811, CVE-2006-3812)


References

https://www.redhat.com/security/data/cve/CVE-2006-2776.html
https://www.redhat.com/security/data/cve/CVE-2006-2778.html
https://www.redhat.com/security/data/cve/CVE-2006-2779.html
https://www.redhat.com/security/data/cve/CVE-2006-2780.html
https://www.redhat.com/security/data/cve/CVE-2006-2781.html
https://www.redhat.com/security/data/cve/CVE-2006-2782.html
https://www.redhat.com/security/data/cve/CVE-2006-2783.html
https://www.redhat.com/security/data/cve/CVE-2006-2784.html
https://www.redhat.com/security/data/cve/CVE-2006-2785.html
https://www.redhat.com/security/data/cve/CVE-2006-2786.html
https://www.redhat.com/security/data/cve/CVE-2006-2787.html
https://www.redhat.com/security/data/cve/CVE-2006-2788.html
https://www.redhat.com/security/data/cve/CVE-2006-3113.html
https://www.redhat.com/security/data/cve/CVE-2006-3677.html
https://www.redhat.com/security/data/cve/CVE-2006-3801.html
https://www.redhat.com/security/data/cve/CVE-2006-3802.html
https://www.redhat.com/security/data/cve/CVE-2006-3803.html
https://www.redhat.com/security/data/cve/CVE-2006-3804.html
https://www.redhat.com/security/data/cve/CVE-2006-3805.html
https://www.redhat.com/security/data/cve/CVE-2006-3806.html
https://www.redhat.com/security/data/cve/CVE-2006-3807.html
https://www.redhat.com/security/data/cve/CVE-2006-3808.html
https://www.redhat.com/security/data/cve/CVE-2006-3809.html
https://www.redhat.com/security/data/cve/CVE-2006-3810.html
https://www.redhat.com/security/data/cve/CVE-2006-3811.html
https://www.redhat.com/security/data/cve/CVE-2006-3812.html
http://www.redhat.com/security/updates/classification/#critical


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/