Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2009-3979
Vulnerability from cvelistv5
Published
2009-12-17 17:00
Modified
2024-08-07 06:45
Severity ?
EPSS score ?
Summary
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.0.16 and 3.5.x before 3.5.6, SeaMonkey before 2.0.1, and Thunderbird allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T06:45:50.879Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "37704", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/37704" }, { "name": "RHSA-2010:0153", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0153.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=293347" }, { "name": "37699", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/37699" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=546694" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=479931" }, { "name": "oval:org.mitre.oval:def:10956", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10956" }, { "name": "ADV-2009-3547", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/3547" }, { "name": "37703", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/37703" }, { "name": "ADV-2010-0650", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/0650" }, { "name": "37881", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/37881" }, { "name": "mozilla-seamonkey-browser-code-exec(54799)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54799" }, { "name": "FEDORA-2009-13362", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2009-December/msg01034.html" }, { "name": "37785", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/37785" }, { "name": "1023333", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1023333" }, { "name": "USN-874-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-874-1" }, { "name": "37813", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/37813" }, { "name": "FEDORA-2009-13333", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00995.html" }, { "name": "USN-873-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-873-1" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=516237" }, { "name": "RHSA-2010:0154", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0154.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=522374" }, { "name": "37349", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/37349" }, { "name": "RHSA-2009:1674", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://rhn.redhat.com/errata/RHSA-2009-1674.html" }, { "name": "FEDORA-2009-13366", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2009-December/msg01041.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=494617" }, { "name": "DSA-1956", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2009/dsa-1956" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=506267" }, { "name": "37856", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/37856" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.mozilla.org/security/announce/2009/mfsa2009-65.html" }, { "name": "RHSA-2009:1673", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://rhn.redhat.com/errata/RHSA-2009-1673.html" }, { "name": "1023334", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1023334" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=515811" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=457514" }, { "name": "SUSE-SA:2009:063", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://www.novell.com/linux/security/advisories/2009_63_firefox.html" }, { "name": "37361", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/37361" }, { "name": "oval:org.mitre.oval:def:8487", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8487" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2009-12-15T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.0.16 and 3.5.x before 3.5.6, SeaMonkey before 2.0.1, and Thunderbird allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-18T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "37704", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/37704" }, { "name": "RHSA-2010:0153", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0153.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=293347" }, { "name": "37699", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/37699" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=546694" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=479931" }, { "name": "oval:org.mitre.oval:def:10956", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10956" }, { "name": "ADV-2009-3547", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/3547" }, { "name": "37703", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/37703" }, { "name": "ADV-2010-0650", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/0650" }, { "name": "37881", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/37881" }, { "name": "mozilla-seamonkey-browser-code-exec(54799)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54799" }, { "name": "FEDORA-2009-13362", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2009-December/msg01034.html" }, { "name": "37785", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/37785" }, { "name": "1023333", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1023333" }, { "name": "USN-874-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-874-1" }, { "name": "37813", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/37813" }, { "name": "FEDORA-2009-13333", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00995.html" }, { "name": "USN-873-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-873-1" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=516237" }, { "name": "RHSA-2010:0154", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0154.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=522374" }, { "name": "37349", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/37349" }, { "name": "RHSA-2009:1674", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://rhn.redhat.com/errata/RHSA-2009-1674.html" }, { "name": "FEDORA-2009-13366", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2009-December/msg01041.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=494617" }, { "name": "DSA-1956", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2009/dsa-1956" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=506267" }, { "name": "37856", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/37856" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.mozilla.org/security/announce/2009/mfsa2009-65.html" }, { "name": "RHSA-2009:1673", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://rhn.redhat.com/errata/RHSA-2009-1673.html" }, { "name": "1023334", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1023334" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=515811" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=457514" }, { "name": "SUSE-SA:2009:063", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://www.novell.com/linux/security/advisories/2009_63_firefox.html" }, { "name": "37361", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/37361" }, { "name": "oval:org.mitre.oval:def:8487", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8487" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2009-3979", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.0.16 and 3.5.x before 3.5.6, SeaMonkey before 2.0.1, and Thunderbird allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "37704", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/37704" }, { "name": "RHSA-2010:0153", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2010-0153.html" }, { "name": "https://bugzilla.mozilla.org/show_bug.cgi?id=293347", "refsource": "CONFIRM", "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=293347" }, { "name": "37699", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/37699" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=546694", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=546694" }, { "name": "https://bugzilla.mozilla.org/show_bug.cgi?id=479931", "refsource": "CONFIRM", "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=479931" }, { "name": "oval:org.mitre.oval:def:10956", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10956" }, { "name": "ADV-2009-3547", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/3547" }, { "name": "37703", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/37703" }, { "name": "ADV-2010-0650", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/0650" }, { "name": "37881", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/37881" }, { "name": "mozilla-seamonkey-browser-code-exec(54799)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54799" }, { "name": "FEDORA-2009-13362", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2009-December/msg01034.html" }, { "name": "37785", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/37785" }, { "name": "1023333", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1023333" }, { "name": "USN-874-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-874-1" }, { "name": "37813", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/37813" }, { "name": "FEDORA-2009-13333", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00995.html" }, { "name": "USN-873-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-873-1" }, { "name": "https://bugzilla.mozilla.org/show_bug.cgi?id=516237", "refsource": "CONFIRM", "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=516237" }, { "name": "RHSA-2010:0154", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2010-0154.html" }, { "name": "https://bugzilla.mozilla.org/show_bug.cgi?id=522374", "refsource": "CONFIRM", "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=522374" }, { "name": "37349", "refsource": "BID", "url": "http://www.securityfocus.com/bid/37349" }, { "name": "RHSA-2009:1674", "refsource": "REDHAT", "url": "https://rhn.redhat.com/errata/RHSA-2009-1674.html" }, { "name": "FEDORA-2009-13366", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2009-December/msg01041.html" }, { "name": "https://bugzilla.mozilla.org/show_bug.cgi?id=494617", "refsource": "CONFIRM", "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=494617" }, { "name": "DSA-1956", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2009/dsa-1956" }, { "name": "https://bugzilla.mozilla.org/show_bug.cgi?id=506267", "refsource": "CONFIRM", "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=506267" }, { "name": "37856", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/37856" }, { "name": "http://www.mozilla.org/security/announce/2009/mfsa2009-65.html", "refsource": "CONFIRM", "url": "http://www.mozilla.org/security/announce/2009/mfsa2009-65.html" }, { "name": "RHSA-2009:1673", "refsource": "REDHAT", "url": "https://rhn.redhat.com/errata/RHSA-2009-1673.html" }, { "name": "1023334", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1023334" }, { "name": "https://bugzilla.mozilla.org/show_bug.cgi?id=515811", "refsource": "CONFIRM", "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=515811" }, { "name": "https://bugzilla.mozilla.org/show_bug.cgi?id=457514", "refsource": "CONFIRM", "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=457514" }, { "name": "SUSE-SA:2009:063", "refsource": "SUSE", "url": "http://www.novell.com/linux/security/advisories/2009_63_firefox.html" }, { "name": "37361", "refsource": "BID", "url": "http://www.securityfocus.com/bid/37361" }, { "name": "oval:org.mitre.oval:def:8487", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8487" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2009-3979", "datePublished": "2009-12-17T17:00:00", "dateReserved": "2009-11-19T00:00:00", "dateUpdated": "2024-08-07T06:45:50.879Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2009-3979\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2009-12-17T17:30:00.327\",\"lastModified\":\"2024-11-21T01:08:39.437\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.0.16 and 3.5.x before 3.5.6, SeaMonkey before 2.0.1, and Thunderbird allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.\"},{\"lang\":\"es\",\"value\":\"M\u00faltiples vulnerabilidades no especificadas en el motor del navegador de Mozilla Firefox antes de v3.0.16 y 3.5.x antes de 3.5.6, SeaMonkey antes de v2.0.1 y Thunderbird permiten a atacantes remotos provocar una denegaci\u00f3n de servicio (por corrupci\u00f3n de la memoria y bloqueo de la aplicaci\u00f3n) o posiblemente ejecutar c\u00f3digo arbitrario a trav\u00e9s de vectores desconocidos.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:C/I:C/A:C\",\"baseScore\":9.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":8.6,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.0.15\",\"matchCriteriaId\":\"D6FE3EA3-5DE1-45B4-A905-BF6769F6B608\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C7AA88B-638A-451A-B235-A1A1444BE417\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C01AD7C-8470-47AB-B8AE-670E3A381E89\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E43F2F1-9252-4B44-8A61-D05305915A5F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3BB9D48B-DC7B-4D92-BB26-B6DE629A2506\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A360D595-A829-4DDE-932E-9995626917E5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E9B5349-FAA7-4CDA-9533-1AD1ACDFAC4E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:0.6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07243837-C353-4C25-A5B1-4DA32807E97D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B832C034-F793-415F-BFC8-D97A18BA6BC7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:0.7.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"83CD1A13-66CB-49CC-BD84-5D8334DB774A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"93C142C5-3A85-432B-80D6-2E7B1B4694F4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:0.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2434FCE7-A50B-4527-9970-C7224B31141C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:0.9:rc:*:*:*:*:*:*\",\"matchCriteriaId\":\"5633FB6E-D623-49D4-9858-4E20E64DE458\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:0.9.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"429ECA02-DBCD-45FB-942C-CA4BC1BC8A72\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:0.9.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B5F0DC80-5473-465C-9D7F-9589F1B78E12\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:0.9.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"567FF916-7DE0-403C-8528-7931A43E0D18\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:0.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"010B34F4-910E-4515-990B-8E72DF009578\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:0.10.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8FAA1A89-E8D9-46D0-8E2C-9259920ACBFE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A545A77-2198-4685-A87F-E0F2DAECECF6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:1.0:preview_release:*:*:*:*:*:*\",\"matchCriteriaId\":\"438AACF8-006F-4522-853F-30DBBABD8C15\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:1.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"778FAE0C-A5CF-4B67-93A9-1A803E3E699F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:1.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E7447185-7509-449D-8907-F30A42CF7EB5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:1.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0EDBAC37-9D08-44D1-B279-BC6ACF126CAF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:1.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3FFF89FA-2020-43CC-BACD-D66117B3DD26\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:1.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"834BB391-5EB5-43A8-980A-D305EDAE6FA7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:1.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A38AD88-BAA6-4FBE-885B-69E951BD1EFE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:1.0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B500EE6C-99DB-49A3-A1F1-AFFD7FE28068\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:1.0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4F2938F2-A801-45E5-8E06-BE03DE03C8A7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:1.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F18A45C0-419C-4723-AB7D-5880EF668CE9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ABB88E86-6E83-4A59-9266-8B98AA91774D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:1.5:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"E19ED1CA-DEBD-4786-BA7B-C122C7D2E5B7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:1.5:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"66BE50FE-EA21-4633-A181-CD35196DF06E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:1.5.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7D6BF5B1-86D1-47FE-9D9C-735718F94874\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:1.5.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"84D15CE0-69DF-4EFD-801E-96A4D6AABEDB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:1.5.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CEE203DE-6C0E-4FDE-9C3A-0E73430F17DA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:1.5.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F2F38886-C25A-4C6B-93E7-36461405BA99\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:1.5.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C65D2670-F37F-48CB-804A-D35BB1C27D9F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:1.5.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE8E5194-7B34-4802-BDA6-6A86EB5EDE05\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:1.5.0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FABA5F56-99F7-4F8F-9CC1-5B0B2EB72922\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:1.5.0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2917BD67-CE81-4B94-B241-D4A9DDA60319\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:1.5.0.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A524A94E-F19B-42B9-AA8E-171751C339AA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:1.5.0.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F71436CF-F756-44E0-8E69-6951F6B3E54A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:1.5.0.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"582EE839-B83F-4908-9780-D0C92DC44FD0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:1.5.0.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"824369CF-00A0-434E-94BC-71CA1317012C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:1.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BCB35099-B04E-4796-A25D-953329FE62F3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:1.5.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5DBEBCFD-80D6-466A-BAEF-C75E65A3B12E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:1.5.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C30ACBCA-4FA1-46DE-8F15-4830BC27E160\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:1.5.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9453EF65-7C69-449E-BF7C-4FECFB56713E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:1.5.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4AA75825-21CF-475B-8040-126A13FA2216\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:1.5.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA97C80E-17FA-4866-86CE-29886145ED80\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:1.5.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7DE24BED-202E-416D-B5F2-8207D97B9939\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:1.5.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"04198E04-CE1D-4A5A-A20C-D1E135B45F94\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:1.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"717DB967-F658-4699-A224-5B261BFEC10A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3487FA64-BE04-42CA-861E-3DAC097D7D32\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:2.0:beta_1:*:*:*:*:*:*\",\"matchCriteriaId\":\"F61EA4A1-1916-48A5-8196-E3CDEF3108F6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:2.0:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"A956C036-1E47-49B2-A971-69868A510B75\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:2.0:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"F5AA254D-D41E-464F-9E2A-A950F08C6946\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:2.0:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"B05D2655-6641-42BE-9793-30005AC9D40D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:2.0.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F3D956DC-C73B-439F-8D79-8239207CC76F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:2.0.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"57E2C7E7-56C0-466C-BB08-5EB43922C4F9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:2.0.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"462E135A-5616-46CC-A9C0-5A7A0526ACC6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:2.0.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6121F9C1-F4DF-4AAB-9E51-AC1592AA5639\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:2.0.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"58D44634-A0B5-4F05-8983-B08D392EC742\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:2.0.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB3AC3D3-FDD7-489F-BDCF-BDB55DF33A8B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:2.0.0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4105171B-9C90-4ABF-B220-A35E7BA9EE40\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:2.0.0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"20985549-DB24-4B69-9D40-208A47AE658E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:2.0.0.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"43A13026-416F-4308-8A1B-E989BD769E12\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:2.0.0.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"612B015E-9F96-4CE6-83E4-23848FD609E5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:2.0.0.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E391619-0967-43E1-8CBC-4D54F72A85C2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:2.0.0.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0544D626-E269-4677-9B05-7DAB23BD103B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:2.0.0.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C95F7B2C-80FC-4DF2-9680-F74634DCE3E6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:2.0.0.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"863C140E-DC15-4A88-AB8A-8AEF9F4B8164\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:2.0.0.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"38CD049A-5333-4FF7-AD34-6B74E19BADCB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:2.0.0.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0066576D-D66A-4B59-B5C3-471EEBEE8B9A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:2.0.0.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"60ED6DAA-9194-4829-BC1A-00F04BE7930A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:2.0.0.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"13BEB9A6-EFD5-4793-9603-84DB84F1CF7D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:2.0.0.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"461163C6-4CA8-4BA9-95A1-136E612CBA6B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:2.0.0.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"275E9D96-1290-44AB-BF9B-E9E4A803F593\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:2.0.0.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"140EFF03-09CB-436E-AF3F-1CEEFF4D3F1D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:2.0_.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"23D609B2-F66C-40F1-B7D9-965189F875A5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:2.0_.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"327D8879-0B61-4681-886D-C53BE251E0ED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:2.0_.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"59017F18-6C4E-4803-8A65-DB2A849C3197\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:2.0_.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF006282-943B-4885-B523-6E575D664059\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:2.0_.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"26356AB4-1C06-4E16-BAC1-B6A41626A222\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:2.0_.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5CC11707-DF87-4046-964D-40CF22385A48\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:2.0_.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F73F1171-E34D-4AC0-BF8B-3DB38AA13EF3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:2.0_8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0422C796-ECC4-42C1-9580-1CE22A096244\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"412DF091-7604-4110-87A0-3488116A97E5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:3.0:alpha:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A1DE6AC-C6AA-4B27-AC21-3293E5357A7E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:3.0:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"13AAF607-AEEE-4FAF-BE63-73B1D951EF52\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:3.0:beta5:*:*:*:*:*:*\",\"matchCriteriaId\":\"20139741-10B1-4E4B-8D5F-A715042049C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:3.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"11E07FED-ABDB-4B0A-AB2E-4CBF1EAC4301\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:3.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A6558F1-9E0D-4107-909A-8EF4BC8A9C2F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:3.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"63DF3D65-C992-44CF-89B4-893526C6242E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:3.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A9024117-2E8B-4240-9E21-CC501F3879B5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:3.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FBC3CAD3-2F54-4E32-A0C9-0D826C45AC23\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:3.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"52624B41-AB34-40AD-8709-D9646B618AB0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:3.0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"917E9856-9556-4FD6-A834-858F8837A6B4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:3.0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"98BBD74D-930C-4D80-A91B-0D61347BAA63\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:3.0.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FAF2E696-883D-4DE5-8B79-D8E5D9470253\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:3.0.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"94E04FD9-38E8-462D-82C2-729F7F7F0465\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:3.0.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5888517E-3C57-4A0A-9895-EA4BCB0A0ED5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:3.0.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0BB21291-B9F3-445E-A9E9-EA1822083DD3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:3.0.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D595F649-ECBE-45E0-8AAD-BCBC65A654B9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:3.0.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4FE6E920-9A4C-431B-89EA-683A22F15ACD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:3.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"031E8624-5161-43AF-AF19-6BAB5A94FDD8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:3.5.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"54186D4A-C6F0-44AD-94FB-73B4346ABB6B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:3.5.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"47E50AD9-BA35-4817-BD4D-5D678FC5A3C5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:3.5.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD09DE40-8C9B-41EA-B372-9E4E4830E8F4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:3.5.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F223FB83-0EDB-4429-94B9-1AEEF314B73F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:*:rc2:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.0\",\"matchCriteriaId\":\"D468F2BD-C234-4798-B44B-F791B02346E7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"09E18FC0-0C8C-4FA1-85B9-B868D00F002F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:1.0:alpha:*:*:*:*:*:*\",\"matchCriteriaId\":\"4A97B6E1-EABA-4977-A3FC-64DF0392AA95\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:1.0:beta:*:*:*:*:*:*\",\"matchCriteriaId\":\"CB01A97F-ACE1-4A99-8939-6DF8FE5B5E8E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6521C877-63C9-4B6E-9FC9-1263FFBB7950\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D949DF0A-CBC2-40E1-AE6C-60E6F58D2481\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:1.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C5CDA57-1A50-4EDB-80E2-D3EBB44EA653\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:1.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"22D33486-4956-4E2C-BA16-FA269A9D02BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:1.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3104343E-93B6-4D4A-BC95-ED9F7E91FB6A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:1.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"381313EF-DF84-4F66-9962-DE8F45029D79\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:1.0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A0228476-14E4-443C-BBAE-2C9CD8594DC0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:1.0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A803A500-DCE2-44FC-ABEB-A90A1D39D85C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:1.0.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"022274DE-5251-49C9-B6E5-1D8CEDC34E7D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:1.0.99:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E1E99882-786F-455F-BAC4-30716120964A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B9F84CB7-93F7-4912-BC87-497867B96491\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:1.1:alpha:*:*:*:*:*:*\",\"matchCriteriaId\":\"8992E9C6-09B3-492E-B7DA-899D5238EC18\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:1.1:beta:*:*:*:*:*:*\",\"matchCriteriaId\":\"D58B704B-F06E-44C1-BBD1-A090D1E6583A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:1.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"40270FBD-744A-49D9-9FFA-1DCD897210D7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:1.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"20E01097-F60A-4FB2-BA47-84A267EE87D6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:1.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F65732F-317B-49A2-B9B0-FA1102B8B45C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:1.1.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB430F19-069A-43FD-9097-586D4449D327\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:1.1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"76AD0439-3BFB-4AD1-8E2C-99D0B099FA8C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:1.1.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E6D7528-E591-48A6-8165-BE42F8EBF6B6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:1.1.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA710423-0075-44B8-9DCB-6380FA974486\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:1.1.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C5521DA3-E6AF-4350-B971-10B4A1C9B1D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:1.1.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DDD15752-A253-47B1-BCE0-B55B84B47C9F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:1.1.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"60B39A9D-44A4-4D7F-9004-C44066BBE277\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:1.1.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F203EC52-2126-4227-AF3B-23857E5BB222\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:1.1.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E951567B-8402-42EA-AE33-EBA9235A868F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:1.1.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"82A94198-7EBF-4D8A-A99A-A32A8561FF2F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:1.1.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1BFFBC58-ACD2-449D-B010-5026D6022F86\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:1.1.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"83EED5D2-EC40-4253-991B-0C746FBEF6A5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:1.1.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F73092C-1458-4278-A30D-C0F89B1F82F6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:1.1.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AAB559BD-4BF7-417F-962F-B8971FF1614B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:1.5.0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"69DD17EC-99EB-46C1-98E9-16A2EDB8E224\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:1.5.0.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F35F7EA1-8C98-4A3E-8767-89DBC26A32B9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:1.5.0.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF89719E-C415-45A3-A1CC-FAFDFCAE3055\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"58EB8E8A-84DE-43AA-B8F0-B585FB73D724\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:2.0:alpha_1:*:*:*:*:*:*\",\"matchCriteriaId\":\"C19C0BF7-390D-4E2E-BA32-28DFF73C55F6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:2.0:alpha_2:*:*:*:*:*:*\",\"matchCriteriaId\":\"5FE5E50C-80ED-4CA7-BC85-8BD2E324D527\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:2.0:alpha_3:*:*:*:*:*:*\",\"matchCriteriaId\":\"FEBF912C-A12E-4DBD-84AC-8B440E190BCE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:2.0:beta_1:*:*:*:*:*:*\",\"matchCriteriaId\":\"9B8EDED6-29EF-4A9F-955D-F5E6611C2141\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:2.0:beta_2:*:*:*:*:*:*\",\"matchCriteriaId\":\"EDC9C82D-586A-48F4-B540-1E2AE79806B3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:2.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"51FCF83B-630A-4413-BFAA-0C24A6B8F4F4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:2.0a1:*:pre:*:*:*:*:*\",\"matchCriteriaId\":\"8D2EF8EE-86BB-4C61-9406-BCE7CBC4D5F3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:2.0a1pre:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7D090A28-8D89-49F1-B020-3915D150FD57\"}]}]}],\"references\":[{\"url\":\"http://secunia.com/advisories/37699\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/37703\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/37704\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/37785\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/37813\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/37856\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/37881\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://securitytracker.com/id?1023333\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://securitytracker.com/id?1023334\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.debian.org/security/2009/dsa-1956\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.mozilla.org/security/announce/2009/mfsa2009-65.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.novell.com/linux/security/advisories/2009_63_firefox.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2010-0153.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2010-0154.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/37349\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/37361\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.ubuntu.com/usn/USN-873-1\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.ubuntu.com/usn/USN-874-1\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2009/3547\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2010/0650\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://bugzilla.mozilla.org/show_bug.cgi?id=293347\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://bugzilla.mozilla.org/show_bug.cgi?id=457514\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://bugzilla.mozilla.org/show_bug.cgi?id=479931\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://bugzilla.mozilla.org/show_bug.cgi?id=494617\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://bugzilla.mozilla.org/show_bug.cgi?id=506267\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://bugzilla.mozilla.org/show_bug.cgi?id=515811\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://bugzilla.mozilla.org/show_bug.cgi?id=516237\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://bugzilla.mozilla.org/show_bug.cgi?id=522374\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=546694\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/54799\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10956\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8487\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://rhn.redhat.com/errata/RHSA-2009-1673.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://rhn.redhat.com/errata/RHSA-2009-1674.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00995.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2009-December/msg01034.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2009-December/msg01041.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/37699\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/37703\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/37704\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/37785\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/37813\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/37856\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/37881\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://securitytracker.com/id?1023333\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://securitytracker.com/id?1023334\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2009/dsa-1956\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.mozilla.org/security/announce/2009/mfsa2009-65.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.novell.com/linux/security/advisories/2009_63_firefox.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2010-0153.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2010-0154.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/37349\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/37361\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.ubuntu.com/usn/USN-873-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.ubuntu.com/usn/USN-874-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2009/3547\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2010/0650\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://bugzilla.mozilla.org/show_bug.cgi?id=293347\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://bugzilla.mozilla.org/show_bug.cgi?id=457514\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://bugzilla.mozilla.org/show_bug.cgi?id=479931\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://bugzilla.mozilla.org/show_bug.cgi?id=494617\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://bugzilla.mozilla.org/show_bug.cgi?id=506267\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://bugzilla.mozilla.org/show_bug.cgi?id=515811\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://bugzilla.mozilla.org/show_bug.cgi?id=516237\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://bugzilla.mozilla.org/show_bug.cgi?id=522374\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=546694\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/54799\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10956\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8487\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://rhn.redhat.com/errata/RHSA-2009-1673.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://rhn.redhat.com/errata/RHSA-2009-1674.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00995.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2009-December/msg01034.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2009-December/msg01041.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
rhsa-2009_1673
Vulnerability from csaf_redhat
Published
2009-12-16 04:33
Modified
2024-11-25 11:52
Summary
Red Hat Security Advisory: seamonkey security update
Notes
Topic
Updated seamonkey packages that fix several security issues are now
available for Red Hat Enterprise Linux 3 and 4.
This update has been rated as having critical security impact by the Red
Hat Security Response Team.
Details
SeaMonkey is an open source Web browser, email and newsgroup client, IRC
chat client, and HTML editor.
Several flaws were found in the processing of malformed web content. A web
page containing malicious content could cause SeaMonkey to crash or,
potentially, execute arbitrary code with the privileges of the user running
SeaMonkey. (CVE-2009-3979)
A flaw was found in the SeaMonkey NT Lan Manager (NTLM) authentication
protocol implementation. If an attacker could trick a local user that has
NTLM credentials into visiting a specially-crafted web page, they could
send arbitrary requests, authenticated with the user's NTLM credentials, to
other applications on the user's system. (CVE-2009-3983)
A flaw was found in the way SeaMonkey displayed the SSL location bar
indicator. An attacker could create an unencrypted web page that appears
to be encrypted, possibly tricking the user into believing they are
visiting a secure page. (CVE-2009-3984)
All SeaMonkey users should upgrade to these updated packages, which correct
these issues. After installing the update, SeaMonkey must be restarted for
the changes to take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated seamonkey packages that fix several security issues are now\navailable for Red Hat Enterprise Linux 3 and 4.\n\nThis update has been rated as having critical security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "SeaMonkey is an open source Web browser, email and newsgroup client, IRC\nchat client, and HTML editor.\n\nSeveral flaws were found in the processing of malformed web content. A web\npage containing malicious content could cause SeaMonkey to crash or,\npotentially, execute arbitrary code with the privileges of the user running\nSeaMonkey. (CVE-2009-3979)\n\nA flaw was found in the SeaMonkey NT Lan Manager (NTLM) authentication\nprotocol implementation. If an attacker could trick a local user that has\nNTLM credentials into visiting a specially-crafted web page, they could\nsend arbitrary requests, authenticated with the user\u0027s NTLM credentials, to\nother applications on the user\u0027s system. (CVE-2009-3983)\n\nA flaw was found in the way SeaMonkey displayed the SSL location bar\nindicator. An attacker could create an unencrypted web page that appears\nto be encrypted, possibly tricking the user into believing they are\nvisiting a secure page. (CVE-2009-3984)\n\nAll SeaMonkey users should upgrade to these updated packages, which correct\nthese issues. After installing the update, SeaMonkey must be restarted for\nthe changes to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2009:1673", "url": "https://access.redhat.com/errata/RHSA-2009:1673" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#critical", "url": "https://access.redhat.com/security/updates/classification/#critical" }, { "category": "external", "summary": "546694", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=546694" }, { "category": "external", "summary": "546720", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=546720" }, { "category": "external", "summary": "546722", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=546722" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_1673.json" } ], "title": "Red Hat Security Advisory: seamonkey security update", "tracking": { "current_release_date": "2024-11-25T11:52:04+00:00", "generator": { "date": "2024-11-25T11:52:04+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2009:1673", "initial_release_date": "2009-12-16T04:33:00+00:00", "revision_history": [ { "date": "2009-12-16T04:33:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2009-12-15T23:37:30+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-25T11:52:04+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 3", "product": { "name": "Red Hat Enterprise Linux AS version 3", "product_id": "3AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::as" } } }, { "category": "product_name", "name": "Red Hat Desktop version 3", "product": { "name": "Red Hat Desktop version 3", "product_id": "3Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 3", "product": { "name": "Red Hat Enterprise Linux ES version 3", "product_id": "3ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 3", "product": { "name": "Red Hat Enterprise Linux WS version 3", "product_id": "3WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::ws" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 4", "product": { "name": "Red Hat Enterprise Linux AS version 4", "product_id": "4AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::as" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop version 4", "product": { "name": "Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 4", "product": { "name": "Red Hat Enterprise Linux ES version 4", "product_id": "4ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 4", "product": { "name": "Red Hat Enterprise Linux WS version 4", "product_id": "4WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::ws" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "seamonkey-js-debugger-0:1.0.9-0.48.el3.ia64", "product": { "name": "seamonkey-js-debugger-0:1.0.9-0.48.el3.ia64", "product_id": "seamonkey-js-debugger-0:1.0.9-0.48.el3.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-js-debugger@1.0.9-0.48.el3?arch=ia64" } } }, { "category": "product_version", "name": "seamonkey-nss-devel-0:1.0.9-0.48.el3.ia64", "product": { "name": "seamonkey-nss-devel-0:1.0.9-0.48.el3.ia64", "product_id": "seamonkey-nss-devel-0:1.0.9-0.48.el3.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nss-devel@1.0.9-0.48.el3?arch=ia64" } } }, { "category": "product_version", "name": "seamonkey-0:1.0.9-0.48.el3.ia64", "product": { "name": "seamonkey-0:1.0.9-0.48.el3.ia64", "product_id": "seamonkey-0:1.0.9-0.48.el3.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey@1.0.9-0.48.el3?arch=ia64" } } }, { "category": "product_version", "name": "seamonkey-devel-0:1.0.9-0.48.el3.ia64", "product": { "name": "seamonkey-devel-0:1.0.9-0.48.el3.ia64", "product_id": "seamonkey-devel-0:1.0.9-0.48.el3.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-devel@1.0.9-0.48.el3?arch=ia64" } } }, { "category": "product_version", "name": "seamonkey-nspr-devel-0:1.0.9-0.48.el3.ia64", "product": { "name": "seamonkey-nspr-devel-0:1.0.9-0.48.el3.ia64", "product_id": "seamonkey-nspr-devel-0:1.0.9-0.48.el3.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nspr-devel@1.0.9-0.48.el3?arch=ia64" } } }, { "category": "product_version", "name": "seamonkey-dom-inspector-0:1.0.9-0.48.el3.ia64", "product": { "name": "seamonkey-dom-inspector-0:1.0.9-0.48.el3.ia64", "product_id": "seamonkey-dom-inspector-0:1.0.9-0.48.el3.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-dom-inspector@1.0.9-0.48.el3?arch=ia64" } } }, { "category": "product_version", "name": "seamonkey-debuginfo-0:1.0.9-0.48.el3.ia64", "product": { "name": "seamonkey-debuginfo-0:1.0.9-0.48.el3.ia64", "product_id": "seamonkey-debuginfo-0:1.0.9-0.48.el3.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-debuginfo@1.0.9-0.48.el3?arch=ia64" } } }, { "category": "product_version", "name": "seamonkey-nss-0:1.0.9-0.48.el3.ia64", "product": { "name": "seamonkey-nss-0:1.0.9-0.48.el3.ia64", "product_id": "seamonkey-nss-0:1.0.9-0.48.el3.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nss@1.0.9-0.48.el3?arch=ia64" } } }, { "category": "product_version", "name": "seamonkey-chat-0:1.0.9-0.48.el3.ia64", "product": { "name": "seamonkey-chat-0:1.0.9-0.48.el3.ia64", "product_id": "seamonkey-chat-0:1.0.9-0.48.el3.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-chat@1.0.9-0.48.el3?arch=ia64" } } }, { "category": "product_version", "name": "seamonkey-mail-0:1.0.9-0.48.el3.ia64", "product": { "name": "seamonkey-mail-0:1.0.9-0.48.el3.ia64", "product_id": "seamonkey-mail-0:1.0.9-0.48.el3.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-mail@1.0.9-0.48.el3?arch=ia64" } } }, { "category": "product_version", "name": "seamonkey-nspr-0:1.0.9-0.48.el3.ia64", "product": { "name": "seamonkey-nspr-0:1.0.9-0.48.el3.ia64", "product_id": "seamonkey-nspr-0:1.0.9-0.48.el3.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nspr@1.0.9-0.48.el3?arch=ia64" } } }, { "category": "product_version", "name": "seamonkey-js-debugger-0:1.0.9-51.el4_8.ia64", "product": { "name": "seamonkey-js-debugger-0:1.0.9-51.el4_8.ia64", "product_id": "seamonkey-js-debugger-0:1.0.9-51.el4_8.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-js-debugger@1.0.9-51.el4_8?arch=ia64" } } }, { "category": "product_version", "name": "seamonkey-mail-0:1.0.9-51.el4_8.ia64", "product": { "name": "seamonkey-mail-0:1.0.9-51.el4_8.ia64", "product_id": "seamonkey-mail-0:1.0.9-51.el4_8.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-mail@1.0.9-51.el4_8?arch=ia64" } } }, { "category": "product_version", "name": "seamonkey-chat-0:1.0.9-51.el4_8.ia64", "product": { "name": "seamonkey-chat-0:1.0.9-51.el4_8.ia64", "product_id": "seamonkey-chat-0:1.0.9-51.el4_8.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-chat@1.0.9-51.el4_8?arch=ia64" } } }, { "category": "product_version", "name": "seamonkey-0:1.0.9-51.el4_8.ia64", "product": { "name": "seamonkey-0:1.0.9-51.el4_8.ia64", "product_id": "seamonkey-0:1.0.9-51.el4_8.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey@1.0.9-51.el4_8?arch=ia64" } } }, { "category": "product_version", "name": "seamonkey-debuginfo-0:1.0.9-51.el4_8.ia64", "product": { "name": "seamonkey-debuginfo-0:1.0.9-51.el4_8.ia64", "product_id": "seamonkey-debuginfo-0:1.0.9-51.el4_8.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-debuginfo@1.0.9-51.el4_8?arch=ia64" } } }, { "category": "product_version", "name": "seamonkey-dom-inspector-0:1.0.9-51.el4_8.ia64", "product": { "name": "seamonkey-dom-inspector-0:1.0.9-51.el4_8.ia64", "product_id": "seamonkey-dom-inspector-0:1.0.9-51.el4_8.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-dom-inspector@1.0.9-51.el4_8?arch=ia64" } } }, { "category": "product_version", "name": "seamonkey-devel-0:1.0.9-51.el4_8.ia64", "product": { "name": "seamonkey-devel-0:1.0.9-51.el4_8.ia64", "product_id": "seamonkey-devel-0:1.0.9-51.el4_8.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-devel@1.0.9-51.el4_8?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "seamonkey-debuginfo-0:1.0.9-0.48.el3.i386", "product": { "name": "seamonkey-debuginfo-0:1.0.9-0.48.el3.i386", "product_id": "seamonkey-debuginfo-0:1.0.9-0.48.el3.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-debuginfo@1.0.9-0.48.el3?arch=i386" } } }, { "category": "product_version", "name": "seamonkey-nss-0:1.0.9-0.48.el3.i386", "product": { "name": "seamonkey-nss-0:1.0.9-0.48.el3.i386", "product_id": "seamonkey-nss-0:1.0.9-0.48.el3.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nss@1.0.9-0.48.el3?arch=i386" } } }, { "category": "product_version", "name": "seamonkey-nspr-0:1.0.9-0.48.el3.i386", "product": { "name": "seamonkey-nspr-0:1.0.9-0.48.el3.i386", "product_id": "seamonkey-nspr-0:1.0.9-0.48.el3.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nspr@1.0.9-0.48.el3?arch=i386" } } }, { "category": "product_version", "name": "seamonkey-0:1.0.9-0.48.el3.i386", "product": { "name": "seamonkey-0:1.0.9-0.48.el3.i386", "product_id": "seamonkey-0:1.0.9-0.48.el3.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey@1.0.9-0.48.el3?arch=i386" } } }, { "category": "product_version", "name": "seamonkey-js-debugger-0:1.0.9-0.48.el3.i386", "product": { "name": "seamonkey-js-debugger-0:1.0.9-0.48.el3.i386", "product_id": "seamonkey-js-debugger-0:1.0.9-0.48.el3.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-js-debugger@1.0.9-0.48.el3?arch=i386" } } }, { "category": "product_version", "name": "seamonkey-nss-devel-0:1.0.9-0.48.el3.i386", "product": { "name": "seamonkey-nss-devel-0:1.0.9-0.48.el3.i386", "product_id": "seamonkey-nss-devel-0:1.0.9-0.48.el3.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nss-devel@1.0.9-0.48.el3?arch=i386" } } }, { "category": "product_version", "name": "seamonkey-devel-0:1.0.9-0.48.el3.i386", "product": { "name": "seamonkey-devel-0:1.0.9-0.48.el3.i386", "product_id": "seamonkey-devel-0:1.0.9-0.48.el3.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-devel@1.0.9-0.48.el3?arch=i386" } } }, { "category": "product_version", "name": "seamonkey-nspr-devel-0:1.0.9-0.48.el3.i386", "product": { "name": "seamonkey-nspr-devel-0:1.0.9-0.48.el3.i386", "product_id": "seamonkey-nspr-devel-0:1.0.9-0.48.el3.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nspr-devel@1.0.9-0.48.el3?arch=i386" } } }, { "category": "product_version", "name": "seamonkey-dom-inspector-0:1.0.9-0.48.el3.i386", "product": { "name": "seamonkey-dom-inspector-0:1.0.9-0.48.el3.i386", "product_id": "seamonkey-dom-inspector-0:1.0.9-0.48.el3.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-dom-inspector@1.0.9-0.48.el3?arch=i386" } } }, { "category": "product_version", "name": "seamonkey-chat-0:1.0.9-0.48.el3.i386", "product": { "name": "seamonkey-chat-0:1.0.9-0.48.el3.i386", "product_id": "seamonkey-chat-0:1.0.9-0.48.el3.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-chat@1.0.9-0.48.el3?arch=i386" } } }, { "category": "product_version", "name": "seamonkey-mail-0:1.0.9-0.48.el3.i386", "product": { "name": "seamonkey-mail-0:1.0.9-0.48.el3.i386", "product_id": "seamonkey-mail-0:1.0.9-0.48.el3.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-mail@1.0.9-0.48.el3?arch=i386" } } }, { "category": "product_version", "name": "seamonkey-js-debugger-0:1.0.9-51.el4_8.i386", "product": { "name": "seamonkey-js-debugger-0:1.0.9-51.el4_8.i386", "product_id": "seamonkey-js-debugger-0:1.0.9-51.el4_8.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-js-debugger@1.0.9-51.el4_8?arch=i386" } } }, { "category": "product_version", "name": "seamonkey-mail-0:1.0.9-51.el4_8.i386", "product": { "name": "seamonkey-mail-0:1.0.9-51.el4_8.i386", "product_id": "seamonkey-mail-0:1.0.9-51.el4_8.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-mail@1.0.9-51.el4_8?arch=i386" } } }, { "category": "product_version", "name": "seamonkey-chat-0:1.0.9-51.el4_8.i386", "product": { "name": "seamonkey-chat-0:1.0.9-51.el4_8.i386", "product_id": "seamonkey-chat-0:1.0.9-51.el4_8.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-chat@1.0.9-51.el4_8?arch=i386" } } }, { "category": "product_version", "name": "seamonkey-0:1.0.9-51.el4_8.i386", "product": { "name": "seamonkey-0:1.0.9-51.el4_8.i386", "product_id": "seamonkey-0:1.0.9-51.el4_8.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey@1.0.9-51.el4_8?arch=i386" } } }, { "category": "product_version", "name": "seamonkey-debuginfo-0:1.0.9-51.el4_8.i386", "product": { "name": "seamonkey-debuginfo-0:1.0.9-51.el4_8.i386", "product_id": "seamonkey-debuginfo-0:1.0.9-51.el4_8.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-debuginfo@1.0.9-51.el4_8?arch=i386" } } }, { "category": "product_version", "name": "seamonkey-dom-inspector-0:1.0.9-51.el4_8.i386", "product": { "name": "seamonkey-dom-inspector-0:1.0.9-51.el4_8.i386", "product_id": "seamonkey-dom-inspector-0:1.0.9-51.el4_8.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-dom-inspector@1.0.9-51.el4_8?arch=i386" } } }, { "category": "product_version", "name": "seamonkey-devel-0:1.0.9-51.el4_8.i386", "product": { "name": "seamonkey-devel-0:1.0.9-51.el4_8.i386", "product_id": "seamonkey-devel-0:1.0.9-51.el4_8.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-devel@1.0.9-51.el4_8?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "seamonkey-js-debugger-0:1.0.9-0.48.el3.x86_64", "product": { "name": "seamonkey-js-debugger-0:1.0.9-0.48.el3.x86_64", "product_id": "seamonkey-js-debugger-0:1.0.9-0.48.el3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-js-debugger@1.0.9-0.48.el3?arch=x86_64" } } }, { "category": "product_version", "name": "seamonkey-nss-devel-0:1.0.9-0.48.el3.x86_64", "product": { "name": "seamonkey-nss-devel-0:1.0.9-0.48.el3.x86_64", "product_id": "seamonkey-nss-devel-0:1.0.9-0.48.el3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nss-devel@1.0.9-0.48.el3?arch=x86_64" } } }, { "category": "product_version", "name": "seamonkey-0:1.0.9-0.48.el3.x86_64", "product": { "name": "seamonkey-0:1.0.9-0.48.el3.x86_64", "product_id": "seamonkey-0:1.0.9-0.48.el3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey@1.0.9-0.48.el3?arch=x86_64" } } }, { "category": "product_version", "name": "seamonkey-devel-0:1.0.9-0.48.el3.x86_64", "product": { "name": "seamonkey-devel-0:1.0.9-0.48.el3.x86_64", "product_id": "seamonkey-devel-0:1.0.9-0.48.el3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-devel@1.0.9-0.48.el3?arch=x86_64" } } }, { "category": "product_version", "name": "seamonkey-nspr-devel-0:1.0.9-0.48.el3.x86_64", "product": { "name": "seamonkey-nspr-devel-0:1.0.9-0.48.el3.x86_64", "product_id": "seamonkey-nspr-devel-0:1.0.9-0.48.el3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nspr-devel@1.0.9-0.48.el3?arch=x86_64" } } }, { "category": "product_version", "name": "seamonkey-dom-inspector-0:1.0.9-0.48.el3.x86_64", "product": { "name": "seamonkey-dom-inspector-0:1.0.9-0.48.el3.x86_64", "product_id": "seamonkey-dom-inspector-0:1.0.9-0.48.el3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-dom-inspector@1.0.9-0.48.el3?arch=x86_64" } } }, { "category": "product_version", "name": "seamonkey-debuginfo-0:1.0.9-0.48.el3.x86_64", "product": { "name": "seamonkey-debuginfo-0:1.0.9-0.48.el3.x86_64", "product_id": "seamonkey-debuginfo-0:1.0.9-0.48.el3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-debuginfo@1.0.9-0.48.el3?arch=x86_64" } } }, { "category": "product_version", "name": "seamonkey-nss-0:1.0.9-0.48.el3.x86_64", "product": { "name": "seamonkey-nss-0:1.0.9-0.48.el3.x86_64", "product_id": "seamonkey-nss-0:1.0.9-0.48.el3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nss@1.0.9-0.48.el3?arch=x86_64" } } }, { "category": "product_version", "name": "seamonkey-chat-0:1.0.9-0.48.el3.x86_64", "product": { "name": "seamonkey-chat-0:1.0.9-0.48.el3.x86_64", "product_id": "seamonkey-chat-0:1.0.9-0.48.el3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-chat@1.0.9-0.48.el3?arch=x86_64" } } }, { "category": "product_version", "name": "seamonkey-mail-0:1.0.9-0.48.el3.x86_64", "product": { "name": "seamonkey-mail-0:1.0.9-0.48.el3.x86_64", "product_id": "seamonkey-mail-0:1.0.9-0.48.el3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-mail@1.0.9-0.48.el3?arch=x86_64" } } }, { "category": "product_version", "name": "seamonkey-nspr-0:1.0.9-0.48.el3.x86_64", "product": { "name": "seamonkey-nspr-0:1.0.9-0.48.el3.x86_64", "product_id": "seamonkey-nspr-0:1.0.9-0.48.el3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nspr@1.0.9-0.48.el3?arch=x86_64" } } }, { "category": "product_version", "name": "seamonkey-js-debugger-0:1.0.9-51.el4_8.x86_64", "product": { "name": "seamonkey-js-debugger-0:1.0.9-51.el4_8.x86_64", "product_id": "seamonkey-js-debugger-0:1.0.9-51.el4_8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-js-debugger@1.0.9-51.el4_8?arch=x86_64" } } }, { "category": "product_version", "name": "seamonkey-mail-0:1.0.9-51.el4_8.x86_64", "product": { "name": "seamonkey-mail-0:1.0.9-51.el4_8.x86_64", "product_id": "seamonkey-mail-0:1.0.9-51.el4_8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-mail@1.0.9-51.el4_8?arch=x86_64" } } }, { "category": "product_version", "name": "seamonkey-chat-0:1.0.9-51.el4_8.x86_64", "product": { "name": "seamonkey-chat-0:1.0.9-51.el4_8.x86_64", "product_id": "seamonkey-chat-0:1.0.9-51.el4_8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-chat@1.0.9-51.el4_8?arch=x86_64" } } }, { "category": "product_version", "name": "seamonkey-0:1.0.9-51.el4_8.x86_64", "product": { "name": "seamonkey-0:1.0.9-51.el4_8.x86_64", "product_id": "seamonkey-0:1.0.9-51.el4_8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey@1.0.9-51.el4_8?arch=x86_64" } } }, { "category": "product_version", "name": "seamonkey-debuginfo-0:1.0.9-51.el4_8.x86_64", "product": { "name": "seamonkey-debuginfo-0:1.0.9-51.el4_8.x86_64", "product_id": "seamonkey-debuginfo-0:1.0.9-51.el4_8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-debuginfo@1.0.9-51.el4_8?arch=x86_64" } } }, { "category": "product_version", "name": "seamonkey-dom-inspector-0:1.0.9-51.el4_8.x86_64", "product": { "name": "seamonkey-dom-inspector-0:1.0.9-51.el4_8.x86_64", "product_id": "seamonkey-dom-inspector-0:1.0.9-51.el4_8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-dom-inspector@1.0.9-51.el4_8?arch=x86_64" } } }, { "category": "product_version", "name": "seamonkey-devel-0:1.0.9-51.el4_8.x86_64", "product": { "name": "seamonkey-devel-0:1.0.9-51.el4_8.x86_64", "product_id": "seamonkey-devel-0:1.0.9-51.el4_8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-devel@1.0.9-51.el4_8?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "seamonkey-0:1.0.9-0.48.el3.src", "product": { "name": "seamonkey-0:1.0.9-0.48.el3.src", "product_id": "seamonkey-0:1.0.9-0.48.el3.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey@1.0.9-0.48.el3?arch=src" } } }, { "category": "product_version", "name": "seamonkey-0:1.0.9-51.el4_8.src", "product": { "name": "seamonkey-0:1.0.9-51.el4_8.src", "product_id": "seamonkey-0:1.0.9-51.el4_8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey@1.0.9-51.el4_8?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "seamonkey-js-debugger-0:1.0.9-0.48.el3.ppc", "product": { "name": "seamonkey-js-debugger-0:1.0.9-0.48.el3.ppc", "product_id": "seamonkey-js-debugger-0:1.0.9-0.48.el3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-js-debugger@1.0.9-0.48.el3?arch=ppc" } } }, { "category": "product_version", "name": "seamonkey-nss-devel-0:1.0.9-0.48.el3.ppc", "product": { "name": "seamonkey-nss-devel-0:1.0.9-0.48.el3.ppc", "product_id": "seamonkey-nss-devel-0:1.0.9-0.48.el3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nss-devel@1.0.9-0.48.el3?arch=ppc" } } }, { "category": "product_version", "name": "seamonkey-0:1.0.9-0.48.el3.ppc", "product": { "name": "seamonkey-0:1.0.9-0.48.el3.ppc", "product_id": "seamonkey-0:1.0.9-0.48.el3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey@1.0.9-0.48.el3?arch=ppc" } } }, { "category": "product_version", "name": "seamonkey-devel-0:1.0.9-0.48.el3.ppc", "product": { "name": "seamonkey-devel-0:1.0.9-0.48.el3.ppc", "product_id": "seamonkey-devel-0:1.0.9-0.48.el3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-devel@1.0.9-0.48.el3?arch=ppc" } } }, { "category": "product_version", "name": "seamonkey-nspr-devel-0:1.0.9-0.48.el3.ppc", "product": { "name": "seamonkey-nspr-devel-0:1.0.9-0.48.el3.ppc", "product_id": "seamonkey-nspr-devel-0:1.0.9-0.48.el3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nspr-devel@1.0.9-0.48.el3?arch=ppc" } } }, { "category": "product_version", "name": "seamonkey-dom-inspector-0:1.0.9-0.48.el3.ppc", "product": { "name": "seamonkey-dom-inspector-0:1.0.9-0.48.el3.ppc", "product_id": "seamonkey-dom-inspector-0:1.0.9-0.48.el3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-dom-inspector@1.0.9-0.48.el3?arch=ppc" } } }, { "category": "product_version", "name": "seamonkey-debuginfo-0:1.0.9-0.48.el3.ppc", "product": { "name": "seamonkey-debuginfo-0:1.0.9-0.48.el3.ppc", "product_id": "seamonkey-debuginfo-0:1.0.9-0.48.el3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-debuginfo@1.0.9-0.48.el3?arch=ppc" } } }, { "category": "product_version", "name": "seamonkey-nss-0:1.0.9-0.48.el3.ppc", "product": { "name": "seamonkey-nss-0:1.0.9-0.48.el3.ppc", "product_id": "seamonkey-nss-0:1.0.9-0.48.el3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nss@1.0.9-0.48.el3?arch=ppc" } } }, { "category": "product_version", "name": "seamonkey-chat-0:1.0.9-0.48.el3.ppc", "product": { "name": "seamonkey-chat-0:1.0.9-0.48.el3.ppc", "product_id": "seamonkey-chat-0:1.0.9-0.48.el3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-chat@1.0.9-0.48.el3?arch=ppc" } } }, { "category": "product_version", "name": "seamonkey-mail-0:1.0.9-0.48.el3.ppc", "product": { "name": "seamonkey-mail-0:1.0.9-0.48.el3.ppc", "product_id": "seamonkey-mail-0:1.0.9-0.48.el3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-mail@1.0.9-0.48.el3?arch=ppc" } } }, { "category": "product_version", "name": "seamonkey-nspr-0:1.0.9-0.48.el3.ppc", "product": { "name": "seamonkey-nspr-0:1.0.9-0.48.el3.ppc", "product_id": "seamonkey-nspr-0:1.0.9-0.48.el3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nspr@1.0.9-0.48.el3?arch=ppc" } } }, { "category": "product_version", "name": "seamonkey-js-debugger-0:1.0.9-51.el4_8.ppc", "product": { "name": "seamonkey-js-debugger-0:1.0.9-51.el4_8.ppc", "product_id": "seamonkey-js-debugger-0:1.0.9-51.el4_8.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-js-debugger@1.0.9-51.el4_8?arch=ppc" } } }, { "category": "product_version", "name": "seamonkey-mail-0:1.0.9-51.el4_8.ppc", "product": { "name": "seamonkey-mail-0:1.0.9-51.el4_8.ppc", "product_id": "seamonkey-mail-0:1.0.9-51.el4_8.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-mail@1.0.9-51.el4_8?arch=ppc" } } }, { "category": "product_version", "name": "seamonkey-chat-0:1.0.9-51.el4_8.ppc", "product": { "name": "seamonkey-chat-0:1.0.9-51.el4_8.ppc", "product_id": "seamonkey-chat-0:1.0.9-51.el4_8.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-chat@1.0.9-51.el4_8?arch=ppc" } } }, { "category": "product_version", "name": "seamonkey-0:1.0.9-51.el4_8.ppc", "product": { "name": "seamonkey-0:1.0.9-51.el4_8.ppc", "product_id": "seamonkey-0:1.0.9-51.el4_8.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey@1.0.9-51.el4_8?arch=ppc" } } }, { "category": "product_version", "name": "seamonkey-debuginfo-0:1.0.9-51.el4_8.ppc", "product": { "name": "seamonkey-debuginfo-0:1.0.9-51.el4_8.ppc", "product_id": "seamonkey-debuginfo-0:1.0.9-51.el4_8.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-debuginfo@1.0.9-51.el4_8?arch=ppc" } } }, { "category": "product_version", "name": "seamonkey-dom-inspector-0:1.0.9-51.el4_8.ppc", "product": { "name": "seamonkey-dom-inspector-0:1.0.9-51.el4_8.ppc", "product_id": "seamonkey-dom-inspector-0:1.0.9-51.el4_8.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-dom-inspector@1.0.9-51.el4_8?arch=ppc" } } }, { "category": "product_version", "name": "seamonkey-devel-0:1.0.9-51.el4_8.ppc", "product": { "name": "seamonkey-devel-0:1.0.9-51.el4_8.ppc", "product_id": "seamonkey-devel-0:1.0.9-51.el4_8.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-devel@1.0.9-51.el4_8?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "seamonkey-js-debugger-0:1.0.9-0.48.el3.s390x", "product": { "name": "seamonkey-js-debugger-0:1.0.9-0.48.el3.s390x", "product_id": "seamonkey-js-debugger-0:1.0.9-0.48.el3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-js-debugger@1.0.9-0.48.el3?arch=s390x" } } }, { "category": "product_version", "name": "seamonkey-nss-devel-0:1.0.9-0.48.el3.s390x", "product": { "name": "seamonkey-nss-devel-0:1.0.9-0.48.el3.s390x", "product_id": "seamonkey-nss-devel-0:1.0.9-0.48.el3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nss-devel@1.0.9-0.48.el3?arch=s390x" } } }, { "category": "product_version", "name": "seamonkey-0:1.0.9-0.48.el3.s390x", "product": { "name": "seamonkey-0:1.0.9-0.48.el3.s390x", "product_id": "seamonkey-0:1.0.9-0.48.el3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey@1.0.9-0.48.el3?arch=s390x" } } }, { "category": "product_version", "name": "seamonkey-devel-0:1.0.9-0.48.el3.s390x", "product": { "name": "seamonkey-devel-0:1.0.9-0.48.el3.s390x", "product_id": "seamonkey-devel-0:1.0.9-0.48.el3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-devel@1.0.9-0.48.el3?arch=s390x" } } }, { "category": "product_version", "name": "seamonkey-nspr-devel-0:1.0.9-0.48.el3.s390x", "product": { "name": "seamonkey-nspr-devel-0:1.0.9-0.48.el3.s390x", "product_id": "seamonkey-nspr-devel-0:1.0.9-0.48.el3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nspr-devel@1.0.9-0.48.el3?arch=s390x" } } }, { "category": "product_version", "name": "seamonkey-dom-inspector-0:1.0.9-0.48.el3.s390x", "product": { "name": "seamonkey-dom-inspector-0:1.0.9-0.48.el3.s390x", "product_id": "seamonkey-dom-inspector-0:1.0.9-0.48.el3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-dom-inspector@1.0.9-0.48.el3?arch=s390x" } } }, { "category": "product_version", "name": "seamonkey-debuginfo-0:1.0.9-0.48.el3.s390x", "product": { "name": "seamonkey-debuginfo-0:1.0.9-0.48.el3.s390x", "product_id": "seamonkey-debuginfo-0:1.0.9-0.48.el3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-debuginfo@1.0.9-0.48.el3?arch=s390x" } } }, { "category": "product_version", "name": "seamonkey-nss-0:1.0.9-0.48.el3.s390x", "product": { "name": "seamonkey-nss-0:1.0.9-0.48.el3.s390x", "product_id": "seamonkey-nss-0:1.0.9-0.48.el3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nss@1.0.9-0.48.el3?arch=s390x" } } }, { "category": "product_version", "name": "seamonkey-chat-0:1.0.9-0.48.el3.s390x", "product": { "name": "seamonkey-chat-0:1.0.9-0.48.el3.s390x", "product_id": "seamonkey-chat-0:1.0.9-0.48.el3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-chat@1.0.9-0.48.el3?arch=s390x" } } }, { "category": "product_version", "name": "seamonkey-mail-0:1.0.9-0.48.el3.s390x", "product": { "name": "seamonkey-mail-0:1.0.9-0.48.el3.s390x", "product_id": "seamonkey-mail-0:1.0.9-0.48.el3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-mail@1.0.9-0.48.el3?arch=s390x" } } }, { "category": "product_version", "name": "seamonkey-nspr-0:1.0.9-0.48.el3.s390x", "product": { "name": "seamonkey-nspr-0:1.0.9-0.48.el3.s390x", "product_id": "seamonkey-nspr-0:1.0.9-0.48.el3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nspr@1.0.9-0.48.el3?arch=s390x" } } }, { "category": "product_version", "name": "seamonkey-js-debugger-0:1.0.9-51.el4_8.s390x", "product": { "name": "seamonkey-js-debugger-0:1.0.9-51.el4_8.s390x", "product_id": "seamonkey-js-debugger-0:1.0.9-51.el4_8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-js-debugger@1.0.9-51.el4_8?arch=s390x" } } }, { "category": "product_version", "name": "seamonkey-mail-0:1.0.9-51.el4_8.s390x", "product": { "name": "seamonkey-mail-0:1.0.9-51.el4_8.s390x", "product_id": "seamonkey-mail-0:1.0.9-51.el4_8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-mail@1.0.9-51.el4_8?arch=s390x" } } }, { "category": "product_version", "name": "seamonkey-chat-0:1.0.9-51.el4_8.s390x", "product": { "name": "seamonkey-chat-0:1.0.9-51.el4_8.s390x", "product_id": "seamonkey-chat-0:1.0.9-51.el4_8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-chat@1.0.9-51.el4_8?arch=s390x" } } }, { "category": "product_version", "name": "seamonkey-0:1.0.9-51.el4_8.s390x", "product": { "name": "seamonkey-0:1.0.9-51.el4_8.s390x", "product_id": "seamonkey-0:1.0.9-51.el4_8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey@1.0.9-51.el4_8?arch=s390x" } } }, { "category": "product_version", "name": "seamonkey-debuginfo-0:1.0.9-51.el4_8.s390x", "product": { "name": "seamonkey-debuginfo-0:1.0.9-51.el4_8.s390x", "product_id": "seamonkey-debuginfo-0:1.0.9-51.el4_8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-debuginfo@1.0.9-51.el4_8?arch=s390x" } } }, { "category": "product_version", "name": "seamonkey-dom-inspector-0:1.0.9-51.el4_8.s390x", "product": { "name": "seamonkey-dom-inspector-0:1.0.9-51.el4_8.s390x", "product_id": "seamonkey-dom-inspector-0:1.0.9-51.el4_8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-dom-inspector@1.0.9-51.el4_8?arch=s390x" } } }, { "category": "product_version", "name": "seamonkey-devel-0:1.0.9-51.el4_8.s390x", "product": { "name": "seamonkey-devel-0:1.0.9-51.el4_8.s390x", "product_id": "seamonkey-devel-0:1.0.9-51.el4_8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-devel@1.0.9-51.el4_8?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "seamonkey-debuginfo-0:1.0.9-0.48.el3.s390", "product": { "name": "seamonkey-debuginfo-0:1.0.9-0.48.el3.s390", "product_id": "seamonkey-debuginfo-0:1.0.9-0.48.el3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-debuginfo@1.0.9-0.48.el3?arch=s390" } } }, { "category": "product_version", "name": "seamonkey-nss-0:1.0.9-0.48.el3.s390", "product": { "name": "seamonkey-nss-0:1.0.9-0.48.el3.s390", "product_id": "seamonkey-nss-0:1.0.9-0.48.el3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nss@1.0.9-0.48.el3?arch=s390" } } }, { "category": "product_version", "name": "seamonkey-nspr-0:1.0.9-0.48.el3.s390", "product": { "name": "seamonkey-nspr-0:1.0.9-0.48.el3.s390", "product_id": "seamonkey-nspr-0:1.0.9-0.48.el3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nspr@1.0.9-0.48.el3?arch=s390" } } }, { "category": "product_version", "name": "seamonkey-js-debugger-0:1.0.9-0.48.el3.s390", "product": { "name": "seamonkey-js-debugger-0:1.0.9-0.48.el3.s390", "product_id": "seamonkey-js-debugger-0:1.0.9-0.48.el3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-js-debugger@1.0.9-0.48.el3?arch=s390" } } }, { "category": "product_version", "name": "seamonkey-nss-devel-0:1.0.9-0.48.el3.s390", "product": { "name": "seamonkey-nss-devel-0:1.0.9-0.48.el3.s390", "product_id": "seamonkey-nss-devel-0:1.0.9-0.48.el3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nss-devel@1.0.9-0.48.el3?arch=s390" } } }, { "category": "product_version", "name": "seamonkey-0:1.0.9-0.48.el3.s390", "product": { "name": "seamonkey-0:1.0.9-0.48.el3.s390", "product_id": "seamonkey-0:1.0.9-0.48.el3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey@1.0.9-0.48.el3?arch=s390" } } }, { "category": "product_version", "name": "seamonkey-devel-0:1.0.9-0.48.el3.s390", "product": { "name": "seamonkey-devel-0:1.0.9-0.48.el3.s390", "product_id": "seamonkey-devel-0:1.0.9-0.48.el3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-devel@1.0.9-0.48.el3?arch=s390" } } }, { "category": "product_version", "name": "seamonkey-nspr-devel-0:1.0.9-0.48.el3.s390", "product": { "name": "seamonkey-nspr-devel-0:1.0.9-0.48.el3.s390", "product_id": "seamonkey-nspr-devel-0:1.0.9-0.48.el3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nspr-devel@1.0.9-0.48.el3?arch=s390" } } }, { "category": "product_version", "name": "seamonkey-dom-inspector-0:1.0.9-0.48.el3.s390", "product": { "name": "seamonkey-dom-inspector-0:1.0.9-0.48.el3.s390", "product_id": "seamonkey-dom-inspector-0:1.0.9-0.48.el3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-dom-inspector@1.0.9-0.48.el3?arch=s390" } } }, { "category": "product_version", "name": "seamonkey-chat-0:1.0.9-0.48.el3.s390", "product": { "name": "seamonkey-chat-0:1.0.9-0.48.el3.s390", "product_id": "seamonkey-chat-0:1.0.9-0.48.el3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-chat@1.0.9-0.48.el3?arch=s390" } } }, { "category": "product_version", "name": "seamonkey-mail-0:1.0.9-0.48.el3.s390", "product": { "name": "seamonkey-mail-0:1.0.9-0.48.el3.s390", "product_id": "seamonkey-mail-0:1.0.9-0.48.el3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-mail@1.0.9-0.48.el3?arch=s390" } } }, { "category": "product_version", "name": "seamonkey-js-debugger-0:1.0.9-51.el4_8.s390", "product": { "name": "seamonkey-js-debugger-0:1.0.9-51.el4_8.s390", "product_id": "seamonkey-js-debugger-0:1.0.9-51.el4_8.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-js-debugger@1.0.9-51.el4_8?arch=s390" } } }, { "category": "product_version", "name": "seamonkey-mail-0:1.0.9-51.el4_8.s390", "product": { "name": "seamonkey-mail-0:1.0.9-51.el4_8.s390", "product_id": "seamonkey-mail-0:1.0.9-51.el4_8.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-mail@1.0.9-51.el4_8?arch=s390" } } }, { "category": "product_version", "name": "seamonkey-chat-0:1.0.9-51.el4_8.s390", "product": { "name": "seamonkey-chat-0:1.0.9-51.el4_8.s390", "product_id": "seamonkey-chat-0:1.0.9-51.el4_8.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-chat@1.0.9-51.el4_8?arch=s390" } } }, { "category": "product_version", "name": "seamonkey-0:1.0.9-51.el4_8.s390", "product": { "name": "seamonkey-0:1.0.9-51.el4_8.s390", "product_id": "seamonkey-0:1.0.9-51.el4_8.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey@1.0.9-51.el4_8?arch=s390" } } }, { "category": "product_version", "name": "seamonkey-debuginfo-0:1.0.9-51.el4_8.s390", "product": { "name": "seamonkey-debuginfo-0:1.0.9-51.el4_8.s390", "product_id": "seamonkey-debuginfo-0:1.0.9-51.el4_8.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-debuginfo@1.0.9-51.el4_8?arch=s390" } } }, { "category": "product_version", "name": "seamonkey-dom-inspector-0:1.0.9-51.el4_8.s390", "product": { "name": "seamonkey-dom-inspector-0:1.0.9-51.el4_8.s390", "product_id": "seamonkey-dom-inspector-0:1.0.9-51.el4_8.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-dom-inspector@1.0.9-51.el4_8?arch=s390" } } }, { "category": "product_version", "name": "seamonkey-devel-0:1.0.9-51.el4_8.s390", "product": { "name": "seamonkey-devel-0:1.0.9-51.el4_8.s390", "product_id": "seamonkey-devel-0:1.0.9-51.el4_8.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-devel@1.0.9-51.el4_8?arch=s390" } } } ], "category": "architecture", "name": "s390" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.9-0.48.el3.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-0:1.0.9-0.48.el3.i386" }, "product_reference": "seamonkey-0:1.0.9-0.48.el3.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.9-0.48.el3.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-0:1.0.9-0.48.el3.ia64" }, "product_reference": "seamonkey-0:1.0.9-0.48.el3.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.9-0.48.el3.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-0:1.0.9-0.48.el3.ppc" }, "product_reference": "seamonkey-0:1.0.9-0.48.el3.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.9-0.48.el3.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-0:1.0.9-0.48.el3.s390" }, "product_reference": "seamonkey-0:1.0.9-0.48.el3.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.9-0.48.el3.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-0:1.0.9-0.48.el3.s390x" }, "product_reference": "seamonkey-0:1.0.9-0.48.el3.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.9-0.48.el3.src as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-0:1.0.9-0.48.el3.src" }, "product_reference": "seamonkey-0:1.0.9-0.48.el3.src", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.9-0.48.el3.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-0:1.0.9-0.48.el3.x86_64" }, "product_reference": "seamonkey-0:1.0.9-0.48.el3.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.9-0.48.el3.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-chat-0:1.0.9-0.48.el3.i386" }, "product_reference": "seamonkey-chat-0:1.0.9-0.48.el3.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.9-0.48.el3.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-chat-0:1.0.9-0.48.el3.ia64" }, "product_reference": "seamonkey-chat-0:1.0.9-0.48.el3.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.9-0.48.el3.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-chat-0:1.0.9-0.48.el3.ppc" }, "product_reference": "seamonkey-chat-0:1.0.9-0.48.el3.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.9-0.48.el3.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-chat-0:1.0.9-0.48.el3.s390" }, "product_reference": "seamonkey-chat-0:1.0.9-0.48.el3.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.9-0.48.el3.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-chat-0:1.0.9-0.48.el3.s390x" }, "product_reference": "seamonkey-chat-0:1.0.9-0.48.el3.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.9-0.48.el3.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-chat-0:1.0.9-0.48.el3.x86_64" }, "product_reference": "seamonkey-chat-0:1.0.9-0.48.el3.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.9-0.48.el3.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-debuginfo-0:1.0.9-0.48.el3.i386" }, "product_reference": "seamonkey-debuginfo-0:1.0.9-0.48.el3.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.9-0.48.el3.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-debuginfo-0:1.0.9-0.48.el3.ia64" }, "product_reference": "seamonkey-debuginfo-0:1.0.9-0.48.el3.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.9-0.48.el3.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-debuginfo-0:1.0.9-0.48.el3.ppc" }, "product_reference": "seamonkey-debuginfo-0:1.0.9-0.48.el3.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.9-0.48.el3.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-debuginfo-0:1.0.9-0.48.el3.s390" }, "product_reference": "seamonkey-debuginfo-0:1.0.9-0.48.el3.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.9-0.48.el3.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-debuginfo-0:1.0.9-0.48.el3.s390x" }, "product_reference": "seamonkey-debuginfo-0:1.0.9-0.48.el3.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.9-0.48.el3.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-debuginfo-0:1.0.9-0.48.el3.x86_64" }, "product_reference": "seamonkey-debuginfo-0:1.0.9-0.48.el3.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.9-0.48.el3.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-devel-0:1.0.9-0.48.el3.i386" }, "product_reference": "seamonkey-devel-0:1.0.9-0.48.el3.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.9-0.48.el3.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-devel-0:1.0.9-0.48.el3.ia64" }, "product_reference": "seamonkey-devel-0:1.0.9-0.48.el3.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.9-0.48.el3.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-devel-0:1.0.9-0.48.el3.ppc" }, "product_reference": "seamonkey-devel-0:1.0.9-0.48.el3.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.9-0.48.el3.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-devel-0:1.0.9-0.48.el3.s390" }, "product_reference": "seamonkey-devel-0:1.0.9-0.48.el3.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.9-0.48.el3.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-devel-0:1.0.9-0.48.el3.s390x" }, "product_reference": "seamonkey-devel-0:1.0.9-0.48.el3.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.9-0.48.el3.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-devel-0:1.0.9-0.48.el3.x86_64" }, "product_reference": "seamonkey-devel-0:1.0.9-0.48.el3.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.9-0.48.el3.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-dom-inspector-0:1.0.9-0.48.el3.i386" }, "product_reference": "seamonkey-dom-inspector-0:1.0.9-0.48.el3.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.9-0.48.el3.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-dom-inspector-0:1.0.9-0.48.el3.ia64" }, "product_reference": "seamonkey-dom-inspector-0:1.0.9-0.48.el3.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.9-0.48.el3.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-dom-inspector-0:1.0.9-0.48.el3.ppc" }, "product_reference": "seamonkey-dom-inspector-0:1.0.9-0.48.el3.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.9-0.48.el3.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-dom-inspector-0:1.0.9-0.48.el3.s390" }, "product_reference": "seamonkey-dom-inspector-0:1.0.9-0.48.el3.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.9-0.48.el3.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-dom-inspector-0:1.0.9-0.48.el3.s390x" }, "product_reference": "seamonkey-dom-inspector-0:1.0.9-0.48.el3.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.9-0.48.el3.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-dom-inspector-0:1.0.9-0.48.el3.x86_64" }, "product_reference": "seamonkey-dom-inspector-0:1.0.9-0.48.el3.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.9-0.48.el3.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-js-debugger-0:1.0.9-0.48.el3.i386" }, "product_reference": "seamonkey-js-debugger-0:1.0.9-0.48.el3.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.9-0.48.el3.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-js-debugger-0:1.0.9-0.48.el3.ia64" }, "product_reference": "seamonkey-js-debugger-0:1.0.9-0.48.el3.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.9-0.48.el3.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-js-debugger-0:1.0.9-0.48.el3.ppc" }, "product_reference": "seamonkey-js-debugger-0:1.0.9-0.48.el3.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.9-0.48.el3.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-js-debugger-0:1.0.9-0.48.el3.s390" }, "product_reference": "seamonkey-js-debugger-0:1.0.9-0.48.el3.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.9-0.48.el3.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-js-debugger-0:1.0.9-0.48.el3.s390x" }, "product_reference": "seamonkey-js-debugger-0:1.0.9-0.48.el3.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.9-0.48.el3.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-js-debugger-0:1.0.9-0.48.el3.x86_64" }, "product_reference": "seamonkey-js-debugger-0:1.0.9-0.48.el3.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.9-0.48.el3.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-mail-0:1.0.9-0.48.el3.i386" }, "product_reference": "seamonkey-mail-0:1.0.9-0.48.el3.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.9-0.48.el3.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-mail-0:1.0.9-0.48.el3.ia64" }, "product_reference": "seamonkey-mail-0:1.0.9-0.48.el3.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.9-0.48.el3.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-mail-0:1.0.9-0.48.el3.ppc" }, "product_reference": "seamonkey-mail-0:1.0.9-0.48.el3.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.9-0.48.el3.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-mail-0:1.0.9-0.48.el3.s390" }, "product_reference": "seamonkey-mail-0:1.0.9-0.48.el3.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.9-0.48.el3.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-mail-0:1.0.9-0.48.el3.s390x" }, "product_reference": "seamonkey-mail-0:1.0.9-0.48.el3.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.9-0.48.el3.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-mail-0:1.0.9-0.48.el3.x86_64" }, "product_reference": "seamonkey-mail-0:1.0.9-0.48.el3.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.9-0.48.el3.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nspr-0:1.0.9-0.48.el3.i386" }, "product_reference": "seamonkey-nspr-0:1.0.9-0.48.el3.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.9-0.48.el3.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nspr-0:1.0.9-0.48.el3.ia64" }, "product_reference": "seamonkey-nspr-0:1.0.9-0.48.el3.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.9-0.48.el3.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nspr-0:1.0.9-0.48.el3.ppc" }, "product_reference": "seamonkey-nspr-0:1.0.9-0.48.el3.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.9-0.48.el3.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nspr-0:1.0.9-0.48.el3.s390" }, "product_reference": "seamonkey-nspr-0:1.0.9-0.48.el3.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.9-0.48.el3.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nspr-0:1.0.9-0.48.el3.s390x" }, "product_reference": "seamonkey-nspr-0:1.0.9-0.48.el3.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.9-0.48.el3.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nspr-0:1.0.9-0.48.el3.x86_64" }, "product_reference": "seamonkey-nspr-0:1.0.9-0.48.el3.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.9-0.48.el3.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nspr-devel-0:1.0.9-0.48.el3.i386" }, "product_reference": "seamonkey-nspr-devel-0:1.0.9-0.48.el3.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.9-0.48.el3.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nspr-devel-0:1.0.9-0.48.el3.ia64" }, "product_reference": "seamonkey-nspr-devel-0:1.0.9-0.48.el3.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.9-0.48.el3.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nspr-devel-0:1.0.9-0.48.el3.ppc" }, "product_reference": "seamonkey-nspr-devel-0:1.0.9-0.48.el3.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.9-0.48.el3.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nspr-devel-0:1.0.9-0.48.el3.s390" }, "product_reference": "seamonkey-nspr-devel-0:1.0.9-0.48.el3.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.9-0.48.el3.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nspr-devel-0:1.0.9-0.48.el3.s390x" }, "product_reference": "seamonkey-nspr-devel-0:1.0.9-0.48.el3.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.9-0.48.el3.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nspr-devel-0:1.0.9-0.48.el3.x86_64" }, "product_reference": "seamonkey-nspr-devel-0:1.0.9-0.48.el3.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.9-0.48.el3.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nss-0:1.0.9-0.48.el3.i386" }, "product_reference": "seamonkey-nss-0:1.0.9-0.48.el3.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.9-0.48.el3.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nss-0:1.0.9-0.48.el3.ia64" }, "product_reference": "seamonkey-nss-0:1.0.9-0.48.el3.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.9-0.48.el3.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nss-0:1.0.9-0.48.el3.ppc" }, "product_reference": "seamonkey-nss-0:1.0.9-0.48.el3.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.9-0.48.el3.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nss-0:1.0.9-0.48.el3.s390" }, "product_reference": "seamonkey-nss-0:1.0.9-0.48.el3.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.9-0.48.el3.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nss-0:1.0.9-0.48.el3.s390x" }, "product_reference": "seamonkey-nss-0:1.0.9-0.48.el3.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.9-0.48.el3.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nss-0:1.0.9-0.48.el3.x86_64" }, "product_reference": "seamonkey-nss-0:1.0.9-0.48.el3.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.9-0.48.el3.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nss-devel-0:1.0.9-0.48.el3.i386" }, "product_reference": "seamonkey-nss-devel-0:1.0.9-0.48.el3.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.9-0.48.el3.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nss-devel-0:1.0.9-0.48.el3.ia64" }, "product_reference": "seamonkey-nss-devel-0:1.0.9-0.48.el3.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.9-0.48.el3.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nss-devel-0:1.0.9-0.48.el3.ppc" }, "product_reference": "seamonkey-nss-devel-0:1.0.9-0.48.el3.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.9-0.48.el3.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nss-devel-0:1.0.9-0.48.el3.s390" }, "product_reference": "seamonkey-nss-devel-0:1.0.9-0.48.el3.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.9-0.48.el3.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nss-devel-0:1.0.9-0.48.el3.s390x" }, "product_reference": "seamonkey-nss-devel-0:1.0.9-0.48.el3.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.9-0.48.el3.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nss-devel-0:1.0.9-0.48.el3.x86_64" }, "product_reference": "seamonkey-nss-devel-0:1.0.9-0.48.el3.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.9-0.48.el3.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-0:1.0.9-0.48.el3.i386" }, "product_reference": "seamonkey-0:1.0.9-0.48.el3.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.9-0.48.el3.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-0:1.0.9-0.48.el3.ia64" }, "product_reference": "seamonkey-0:1.0.9-0.48.el3.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.9-0.48.el3.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-0:1.0.9-0.48.el3.ppc" }, "product_reference": "seamonkey-0:1.0.9-0.48.el3.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.9-0.48.el3.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-0:1.0.9-0.48.el3.s390" }, "product_reference": "seamonkey-0:1.0.9-0.48.el3.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.9-0.48.el3.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-0:1.0.9-0.48.el3.s390x" }, "product_reference": "seamonkey-0:1.0.9-0.48.el3.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.9-0.48.el3.src as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-0:1.0.9-0.48.el3.src" }, "product_reference": "seamonkey-0:1.0.9-0.48.el3.src", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.9-0.48.el3.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-0:1.0.9-0.48.el3.x86_64" }, "product_reference": "seamonkey-0:1.0.9-0.48.el3.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.9-0.48.el3.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-chat-0:1.0.9-0.48.el3.i386" }, "product_reference": "seamonkey-chat-0:1.0.9-0.48.el3.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.9-0.48.el3.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-chat-0:1.0.9-0.48.el3.ia64" }, "product_reference": "seamonkey-chat-0:1.0.9-0.48.el3.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.9-0.48.el3.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-chat-0:1.0.9-0.48.el3.ppc" }, "product_reference": "seamonkey-chat-0:1.0.9-0.48.el3.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.9-0.48.el3.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-chat-0:1.0.9-0.48.el3.s390" }, "product_reference": "seamonkey-chat-0:1.0.9-0.48.el3.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.9-0.48.el3.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-chat-0:1.0.9-0.48.el3.s390x" }, "product_reference": "seamonkey-chat-0:1.0.9-0.48.el3.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.9-0.48.el3.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-chat-0:1.0.9-0.48.el3.x86_64" }, "product_reference": "seamonkey-chat-0:1.0.9-0.48.el3.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.9-0.48.el3.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-debuginfo-0:1.0.9-0.48.el3.i386" }, "product_reference": "seamonkey-debuginfo-0:1.0.9-0.48.el3.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.9-0.48.el3.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-debuginfo-0:1.0.9-0.48.el3.ia64" }, "product_reference": "seamonkey-debuginfo-0:1.0.9-0.48.el3.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.9-0.48.el3.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-debuginfo-0:1.0.9-0.48.el3.ppc" }, "product_reference": "seamonkey-debuginfo-0:1.0.9-0.48.el3.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.9-0.48.el3.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-debuginfo-0:1.0.9-0.48.el3.s390" }, "product_reference": "seamonkey-debuginfo-0:1.0.9-0.48.el3.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.9-0.48.el3.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-debuginfo-0:1.0.9-0.48.el3.s390x" }, "product_reference": "seamonkey-debuginfo-0:1.0.9-0.48.el3.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.9-0.48.el3.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-debuginfo-0:1.0.9-0.48.el3.x86_64" }, "product_reference": "seamonkey-debuginfo-0:1.0.9-0.48.el3.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.9-0.48.el3.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-devel-0:1.0.9-0.48.el3.i386" }, "product_reference": "seamonkey-devel-0:1.0.9-0.48.el3.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.9-0.48.el3.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-devel-0:1.0.9-0.48.el3.ia64" }, "product_reference": "seamonkey-devel-0:1.0.9-0.48.el3.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.9-0.48.el3.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-devel-0:1.0.9-0.48.el3.ppc" }, "product_reference": "seamonkey-devel-0:1.0.9-0.48.el3.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.9-0.48.el3.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-devel-0:1.0.9-0.48.el3.s390" }, "product_reference": "seamonkey-devel-0:1.0.9-0.48.el3.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.9-0.48.el3.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-devel-0:1.0.9-0.48.el3.s390x" }, "product_reference": "seamonkey-devel-0:1.0.9-0.48.el3.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.9-0.48.el3.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-devel-0:1.0.9-0.48.el3.x86_64" }, "product_reference": "seamonkey-devel-0:1.0.9-0.48.el3.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.9-0.48.el3.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-dom-inspector-0:1.0.9-0.48.el3.i386" }, "product_reference": "seamonkey-dom-inspector-0:1.0.9-0.48.el3.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.9-0.48.el3.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-dom-inspector-0:1.0.9-0.48.el3.ia64" }, "product_reference": "seamonkey-dom-inspector-0:1.0.9-0.48.el3.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.9-0.48.el3.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-dom-inspector-0:1.0.9-0.48.el3.ppc" }, "product_reference": "seamonkey-dom-inspector-0:1.0.9-0.48.el3.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.9-0.48.el3.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-dom-inspector-0:1.0.9-0.48.el3.s390" }, "product_reference": "seamonkey-dom-inspector-0:1.0.9-0.48.el3.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.9-0.48.el3.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-dom-inspector-0:1.0.9-0.48.el3.s390x" }, "product_reference": "seamonkey-dom-inspector-0:1.0.9-0.48.el3.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.9-0.48.el3.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-dom-inspector-0:1.0.9-0.48.el3.x86_64" }, "product_reference": "seamonkey-dom-inspector-0:1.0.9-0.48.el3.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.9-0.48.el3.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-js-debugger-0:1.0.9-0.48.el3.i386" }, "product_reference": "seamonkey-js-debugger-0:1.0.9-0.48.el3.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.9-0.48.el3.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-js-debugger-0:1.0.9-0.48.el3.ia64" }, "product_reference": "seamonkey-js-debugger-0:1.0.9-0.48.el3.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.9-0.48.el3.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-js-debugger-0:1.0.9-0.48.el3.ppc" }, "product_reference": "seamonkey-js-debugger-0:1.0.9-0.48.el3.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.9-0.48.el3.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-js-debugger-0:1.0.9-0.48.el3.s390" }, "product_reference": "seamonkey-js-debugger-0:1.0.9-0.48.el3.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.9-0.48.el3.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-js-debugger-0:1.0.9-0.48.el3.s390x" }, "product_reference": "seamonkey-js-debugger-0:1.0.9-0.48.el3.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.9-0.48.el3.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-js-debugger-0:1.0.9-0.48.el3.x86_64" }, "product_reference": "seamonkey-js-debugger-0:1.0.9-0.48.el3.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.9-0.48.el3.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-mail-0:1.0.9-0.48.el3.i386" }, "product_reference": "seamonkey-mail-0:1.0.9-0.48.el3.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.9-0.48.el3.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-mail-0:1.0.9-0.48.el3.ia64" }, "product_reference": "seamonkey-mail-0:1.0.9-0.48.el3.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.9-0.48.el3.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-mail-0:1.0.9-0.48.el3.ppc" }, "product_reference": "seamonkey-mail-0:1.0.9-0.48.el3.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.9-0.48.el3.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-mail-0:1.0.9-0.48.el3.s390" }, "product_reference": "seamonkey-mail-0:1.0.9-0.48.el3.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.9-0.48.el3.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-mail-0:1.0.9-0.48.el3.s390x" }, "product_reference": "seamonkey-mail-0:1.0.9-0.48.el3.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.9-0.48.el3.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-mail-0:1.0.9-0.48.el3.x86_64" }, "product_reference": "seamonkey-mail-0:1.0.9-0.48.el3.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.9-0.48.el3.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nspr-0:1.0.9-0.48.el3.i386" }, "product_reference": "seamonkey-nspr-0:1.0.9-0.48.el3.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.9-0.48.el3.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nspr-0:1.0.9-0.48.el3.ia64" }, "product_reference": "seamonkey-nspr-0:1.0.9-0.48.el3.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.9-0.48.el3.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nspr-0:1.0.9-0.48.el3.ppc" }, "product_reference": "seamonkey-nspr-0:1.0.9-0.48.el3.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.9-0.48.el3.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nspr-0:1.0.9-0.48.el3.s390" }, "product_reference": "seamonkey-nspr-0:1.0.9-0.48.el3.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.9-0.48.el3.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nspr-0:1.0.9-0.48.el3.s390x" }, "product_reference": "seamonkey-nspr-0:1.0.9-0.48.el3.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.9-0.48.el3.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nspr-0:1.0.9-0.48.el3.x86_64" }, "product_reference": "seamonkey-nspr-0:1.0.9-0.48.el3.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.9-0.48.el3.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nspr-devel-0:1.0.9-0.48.el3.i386" }, "product_reference": "seamonkey-nspr-devel-0:1.0.9-0.48.el3.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.9-0.48.el3.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nspr-devel-0:1.0.9-0.48.el3.ia64" }, "product_reference": "seamonkey-nspr-devel-0:1.0.9-0.48.el3.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.9-0.48.el3.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nspr-devel-0:1.0.9-0.48.el3.ppc" }, "product_reference": "seamonkey-nspr-devel-0:1.0.9-0.48.el3.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.9-0.48.el3.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nspr-devel-0:1.0.9-0.48.el3.s390" }, "product_reference": "seamonkey-nspr-devel-0:1.0.9-0.48.el3.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.9-0.48.el3.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nspr-devel-0:1.0.9-0.48.el3.s390x" }, "product_reference": "seamonkey-nspr-devel-0:1.0.9-0.48.el3.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.9-0.48.el3.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nspr-devel-0:1.0.9-0.48.el3.x86_64" }, "product_reference": "seamonkey-nspr-devel-0:1.0.9-0.48.el3.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.9-0.48.el3.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nss-0:1.0.9-0.48.el3.i386" }, "product_reference": "seamonkey-nss-0:1.0.9-0.48.el3.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.9-0.48.el3.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nss-0:1.0.9-0.48.el3.ia64" }, "product_reference": "seamonkey-nss-0:1.0.9-0.48.el3.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.9-0.48.el3.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nss-0:1.0.9-0.48.el3.ppc" }, "product_reference": "seamonkey-nss-0:1.0.9-0.48.el3.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.9-0.48.el3.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nss-0:1.0.9-0.48.el3.s390" }, "product_reference": "seamonkey-nss-0:1.0.9-0.48.el3.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.9-0.48.el3.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nss-0:1.0.9-0.48.el3.s390x" }, "product_reference": "seamonkey-nss-0:1.0.9-0.48.el3.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.9-0.48.el3.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nss-0:1.0.9-0.48.el3.x86_64" }, "product_reference": "seamonkey-nss-0:1.0.9-0.48.el3.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.9-0.48.el3.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nss-devel-0:1.0.9-0.48.el3.i386" }, "product_reference": "seamonkey-nss-devel-0:1.0.9-0.48.el3.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.9-0.48.el3.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nss-devel-0:1.0.9-0.48.el3.ia64" }, "product_reference": "seamonkey-nss-devel-0:1.0.9-0.48.el3.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.9-0.48.el3.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nss-devel-0:1.0.9-0.48.el3.ppc" }, "product_reference": "seamonkey-nss-devel-0:1.0.9-0.48.el3.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.9-0.48.el3.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nss-devel-0:1.0.9-0.48.el3.s390" }, "product_reference": "seamonkey-nss-devel-0:1.0.9-0.48.el3.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.9-0.48.el3.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nss-devel-0:1.0.9-0.48.el3.s390x" }, "product_reference": "seamonkey-nss-devel-0:1.0.9-0.48.el3.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.9-0.48.el3.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nss-devel-0:1.0.9-0.48.el3.x86_64" }, "product_reference": "seamonkey-nss-devel-0:1.0.9-0.48.el3.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.9-0.48.el3.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-0:1.0.9-0.48.el3.i386" }, "product_reference": "seamonkey-0:1.0.9-0.48.el3.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.9-0.48.el3.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-0:1.0.9-0.48.el3.ia64" }, "product_reference": "seamonkey-0:1.0.9-0.48.el3.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.9-0.48.el3.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-0:1.0.9-0.48.el3.ppc" }, "product_reference": "seamonkey-0:1.0.9-0.48.el3.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.9-0.48.el3.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-0:1.0.9-0.48.el3.s390" }, "product_reference": "seamonkey-0:1.0.9-0.48.el3.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.9-0.48.el3.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-0:1.0.9-0.48.el3.s390x" }, "product_reference": "seamonkey-0:1.0.9-0.48.el3.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.9-0.48.el3.src as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-0:1.0.9-0.48.el3.src" }, "product_reference": "seamonkey-0:1.0.9-0.48.el3.src", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.9-0.48.el3.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-0:1.0.9-0.48.el3.x86_64" }, "product_reference": "seamonkey-0:1.0.9-0.48.el3.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.9-0.48.el3.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-chat-0:1.0.9-0.48.el3.i386" }, "product_reference": "seamonkey-chat-0:1.0.9-0.48.el3.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.9-0.48.el3.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-chat-0:1.0.9-0.48.el3.ia64" }, "product_reference": "seamonkey-chat-0:1.0.9-0.48.el3.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.9-0.48.el3.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-chat-0:1.0.9-0.48.el3.ppc" }, "product_reference": "seamonkey-chat-0:1.0.9-0.48.el3.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.9-0.48.el3.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-chat-0:1.0.9-0.48.el3.s390" }, "product_reference": "seamonkey-chat-0:1.0.9-0.48.el3.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.9-0.48.el3.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-chat-0:1.0.9-0.48.el3.s390x" }, "product_reference": "seamonkey-chat-0:1.0.9-0.48.el3.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.9-0.48.el3.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-chat-0:1.0.9-0.48.el3.x86_64" }, "product_reference": "seamonkey-chat-0:1.0.9-0.48.el3.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.9-0.48.el3.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-debuginfo-0:1.0.9-0.48.el3.i386" }, "product_reference": "seamonkey-debuginfo-0:1.0.9-0.48.el3.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.9-0.48.el3.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-debuginfo-0:1.0.9-0.48.el3.ia64" }, "product_reference": "seamonkey-debuginfo-0:1.0.9-0.48.el3.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.9-0.48.el3.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-debuginfo-0:1.0.9-0.48.el3.ppc" }, "product_reference": "seamonkey-debuginfo-0:1.0.9-0.48.el3.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.9-0.48.el3.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-debuginfo-0:1.0.9-0.48.el3.s390" }, "product_reference": "seamonkey-debuginfo-0:1.0.9-0.48.el3.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.9-0.48.el3.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-debuginfo-0:1.0.9-0.48.el3.s390x" }, "product_reference": "seamonkey-debuginfo-0:1.0.9-0.48.el3.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.9-0.48.el3.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-debuginfo-0:1.0.9-0.48.el3.x86_64" }, "product_reference": "seamonkey-debuginfo-0:1.0.9-0.48.el3.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.9-0.48.el3.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-devel-0:1.0.9-0.48.el3.i386" }, "product_reference": "seamonkey-devel-0:1.0.9-0.48.el3.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.9-0.48.el3.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-devel-0:1.0.9-0.48.el3.ia64" }, "product_reference": "seamonkey-devel-0:1.0.9-0.48.el3.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.9-0.48.el3.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-devel-0:1.0.9-0.48.el3.ppc" }, "product_reference": "seamonkey-devel-0:1.0.9-0.48.el3.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.9-0.48.el3.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-devel-0:1.0.9-0.48.el3.s390" }, "product_reference": "seamonkey-devel-0:1.0.9-0.48.el3.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.9-0.48.el3.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-devel-0:1.0.9-0.48.el3.s390x" }, "product_reference": "seamonkey-devel-0:1.0.9-0.48.el3.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.9-0.48.el3.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-devel-0:1.0.9-0.48.el3.x86_64" }, "product_reference": "seamonkey-devel-0:1.0.9-0.48.el3.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.9-0.48.el3.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-dom-inspector-0:1.0.9-0.48.el3.i386" }, "product_reference": "seamonkey-dom-inspector-0:1.0.9-0.48.el3.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.9-0.48.el3.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-dom-inspector-0:1.0.9-0.48.el3.ia64" }, "product_reference": "seamonkey-dom-inspector-0:1.0.9-0.48.el3.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.9-0.48.el3.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-dom-inspector-0:1.0.9-0.48.el3.ppc" }, "product_reference": "seamonkey-dom-inspector-0:1.0.9-0.48.el3.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.9-0.48.el3.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-dom-inspector-0:1.0.9-0.48.el3.s390" }, "product_reference": "seamonkey-dom-inspector-0:1.0.9-0.48.el3.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.9-0.48.el3.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-dom-inspector-0:1.0.9-0.48.el3.s390x" }, "product_reference": "seamonkey-dom-inspector-0:1.0.9-0.48.el3.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.9-0.48.el3.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-dom-inspector-0:1.0.9-0.48.el3.x86_64" }, "product_reference": "seamonkey-dom-inspector-0:1.0.9-0.48.el3.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.9-0.48.el3.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-js-debugger-0:1.0.9-0.48.el3.i386" }, "product_reference": "seamonkey-js-debugger-0:1.0.9-0.48.el3.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.9-0.48.el3.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-js-debugger-0:1.0.9-0.48.el3.ia64" }, "product_reference": "seamonkey-js-debugger-0:1.0.9-0.48.el3.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.9-0.48.el3.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-js-debugger-0:1.0.9-0.48.el3.ppc" }, "product_reference": "seamonkey-js-debugger-0:1.0.9-0.48.el3.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.9-0.48.el3.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-js-debugger-0:1.0.9-0.48.el3.s390" }, "product_reference": "seamonkey-js-debugger-0:1.0.9-0.48.el3.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.9-0.48.el3.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-js-debugger-0:1.0.9-0.48.el3.s390x" }, "product_reference": "seamonkey-js-debugger-0:1.0.9-0.48.el3.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.9-0.48.el3.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-js-debugger-0:1.0.9-0.48.el3.x86_64" }, "product_reference": "seamonkey-js-debugger-0:1.0.9-0.48.el3.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.9-0.48.el3.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-mail-0:1.0.9-0.48.el3.i386" }, "product_reference": "seamonkey-mail-0:1.0.9-0.48.el3.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.9-0.48.el3.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-mail-0:1.0.9-0.48.el3.ia64" }, "product_reference": "seamonkey-mail-0:1.0.9-0.48.el3.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.9-0.48.el3.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-mail-0:1.0.9-0.48.el3.ppc" }, "product_reference": "seamonkey-mail-0:1.0.9-0.48.el3.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.9-0.48.el3.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-mail-0:1.0.9-0.48.el3.s390" }, "product_reference": "seamonkey-mail-0:1.0.9-0.48.el3.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.9-0.48.el3.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-mail-0:1.0.9-0.48.el3.s390x" }, "product_reference": "seamonkey-mail-0:1.0.9-0.48.el3.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.9-0.48.el3.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-mail-0:1.0.9-0.48.el3.x86_64" }, "product_reference": "seamonkey-mail-0:1.0.9-0.48.el3.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.9-0.48.el3.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nspr-0:1.0.9-0.48.el3.i386" }, "product_reference": "seamonkey-nspr-0:1.0.9-0.48.el3.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.9-0.48.el3.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nspr-0:1.0.9-0.48.el3.ia64" }, "product_reference": "seamonkey-nspr-0:1.0.9-0.48.el3.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.9-0.48.el3.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nspr-0:1.0.9-0.48.el3.ppc" }, "product_reference": "seamonkey-nspr-0:1.0.9-0.48.el3.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.9-0.48.el3.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nspr-0:1.0.9-0.48.el3.s390" }, "product_reference": "seamonkey-nspr-0:1.0.9-0.48.el3.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.9-0.48.el3.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nspr-0:1.0.9-0.48.el3.s390x" }, "product_reference": "seamonkey-nspr-0:1.0.9-0.48.el3.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.9-0.48.el3.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nspr-0:1.0.9-0.48.el3.x86_64" }, "product_reference": "seamonkey-nspr-0:1.0.9-0.48.el3.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.9-0.48.el3.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nspr-devel-0:1.0.9-0.48.el3.i386" }, "product_reference": "seamonkey-nspr-devel-0:1.0.9-0.48.el3.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.9-0.48.el3.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nspr-devel-0:1.0.9-0.48.el3.ia64" }, "product_reference": "seamonkey-nspr-devel-0:1.0.9-0.48.el3.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.9-0.48.el3.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nspr-devel-0:1.0.9-0.48.el3.ppc" }, "product_reference": "seamonkey-nspr-devel-0:1.0.9-0.48.el3.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.9-0.48.el3.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nspr-devel-0:1.0.9-0.48.el3.s390" }, "product_reference": "seamonkey-nspr-devel-0:1.0.9-0.48.el3.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.9-0.48.el3.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nspr-devel-0:1.0.9-0.48.el3.s390x" }, "product_reference": "seamonkey-nspr-devel-0:1.0.9-0.48.el3.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.9-0.48.el3.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nspr-devel-0:1.0.9-0.48.el3.x86_64" }, "product_reference": "seamonkey-nspr-devel-0:1.0.9-0.48.el3.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.9-0.48.el3.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nss-0:1.0.9-0.48.el3.i386" }, "product_reference": "seamonkey-nss-0:1.0.9-0.48.el3.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.9-0.48.el3.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nss-0:1.0.9-0.48.el3.ia64" }, "product_reference": "seamonkey-nss-0:1.0.9-0.48.el3.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.9-0.48.el3.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nss-0:1.0.9-0.48.el3.ppc" }, "product_reference": "seamonkey-nss-0:1.0.9-0.48.el3.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.9-0.48.el3.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nss-0:1.0.9-0.48.el3.s390" }, "product_reference": "seamonkey-nss-0:1.0.9-0.48.el3.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.9-0.48.el3.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nss-0:1.0.9-0.48.el3.s390x" }, "product_reference": "seamonkey-nss-0:1.0.9-0.48.el3.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.9-0.48.el3.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nss-0:1.0.9-0.48.el3.x86_64" }, "product_reference": "seamonkey-nss-0:1.0.9-0.48.el3.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.9-0.48.el3.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nss-devel-0:1.0.9-0.48.el3.i386" }, "product_reference": "seamonkey-nss-devel-0:1.0.9-0.48.el3.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.9-0.48.el3.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nss-devel-0:1.0.9-0.48.el3.ia64" }, "product_reference": "seamonkey-nss-devel-0:1.0.9-0.48.el3.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.9-0.48.el3.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nss-devel-0:1.0.9-0.48.el3.ppc" }, "product_reference": "seamonkey-nss-devel-0:1.0.9-0.48.el3.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.9-0.48.el3.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nss-devel-0:1.0.9-0.48.el3.s390" }, "product_reference": "seamonkey-nss-devel-0:1.0.9-0.48.el3.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.9-0.48.el3.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nss-devel-0:1.0.9-0.48.el3.s390x" }, "product_reference": "seamonkey-nss-devel-0:1.0.9-0.48.el3.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.9-0.48.el3.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nss-devel-0:1.0.9-0.48.el3.x86_64" }, "product_reference": "seamonkey-nss-devel-0:1.0.9-0.48.el3.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.9-0.48.el3.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-0:1.0.9-0.48.el3.i386" }, "product_reference": "seamonkey-0:1.0.9-0.48.el3.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.9-0.48.el3.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-0:1.0.9-0.48.el3.ia64" }, "product_reference": "seamonkey-0:1.0.9-0.48.el3.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.9-0.48.el3.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-0:1.0.9-0.48.el3.ppc" }, "product_reference": "seamonkey-0:1.0.9-0.48.el3.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.9-0.48.el3.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-0:1.0.9-0.48.el3.s390" }, "product_reference": "seamonkey-0:1.0.9-0.48.el3.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.9-0.48.el3.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-0:1.0.9-0.48.el3.s390x" }, "product_reference": "seamonkey-0:1.0.9-0.48.el3.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.9-0.48.el3.src as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-0:1.0.9-0.48.el3.src" }, "product_reference": "seamonkey-0:1.0.9-0.48.el3.src", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.9-0.48.el3.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-0:1.0.9-0.48.el3.x86_64" }, "product_reference": "seamonkey-0:1.0.9-0.48.el3.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.9-0.48.el3.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-chat-0:1.0.9-0.48.el3.i386" }, "product_reference": "seamonkey-chat-0:1.0.9-0.48.el3.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.9-0.48.el3.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-chat-0:1.0.9-0.48.el3.ia64" }, "product_reference": "seamonkey-chat-0:1.0.9-0.48.el3.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.9-0.48.el3.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-chat-0:1.0.9-0.48.el3.ppc" }, "product_reference": "seamonkey-chat-0:1.0.9-0.48.el3.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.9-0.48.el3.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-chat-0:1.0.9-0.48.el3.s390" }, "product_reference": "seamonkey-chat-0:1.0.9-0.48.el3.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.9-0.48.el3.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-chat-0:1.0.9-0.48.el3.s390x" }, "product_reference": "seamonkey-chat-0:1.0.9-0.48.el3.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.9-0.48.el3.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-chat-0:1.0.9-0.48.el3.x86_64" }, "product_reference": "seamonkey-chat-0:1.0.9-0.48.el3.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.9-0.48.el3.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-debuginfo-0:1.0.9-0.48.el3.i386" }, "product_reference": "seamonkey-debuginfo-0:1.0.9-0.48.el3.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.9-0.48.el3.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-debuginfo-0:1.0.9-0.48.el3.ia64" }, "product_reference": "seamonkey-debuginfo-0:1.0.9-0.48.el3.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.9-0.48.el3.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-debuginfo-0:1.0.9-0.48.el3.ppc" }, "product_reference": "seamonkey-debuginfo-0:1.0.9-0.48.el3.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.9-0.48.el3.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-debuginfo-0:1.0.9-0.48.el3.s390" }, "product_reference": "seamonkey-debuginfo-0:1.0.9-0.48.el3.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.9-0.48.el3.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-debuginfo-0:1.0.9-0.48.el3.s390x" }, "product_reference": "seamonkey-debuginfo-0:1.0.9-0.48.el3.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.9-0.48.el3.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-debuginfo-0:1.0.9-0.48.el3.x86_64" }, "product_reference": "seamonkey-debuginfo-0:1.0.9-0.48.el3.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.9-0.48.el3.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-devel-0:1.0.9-0.48.el3.i386" }, "product_reference": "seamonkey-devel-0:1.0.9-0.48.el3.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.9-0.48.el3.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-devel-0:1.0.9-0.48.el3.ia64" }, "product_reference": "seamonkey-devel-0:1.0.9-0.48.el3.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.9-0.48.el3.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-devel-0:1.0.9-0.48.el3.ppc" }, "product_reference": "seamonkey-devel-0:1.0.9-0.48.el3.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.9-0.48.el3.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-devel-0:1.0.9-0.48.el3.s390" }, "product_reference": "seamonkey-devel-0:1.0.9-0.48.el3.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.9-0.48.el3.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-devel-0:1.0.9-0.48.el3.s390x" }, "product_reference": "seamonkey-devel-0:1.0.9-0.48.el3.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.9-0.48.el3.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-devel-0:1.0.9-0.48.el3.x86_64" }, "product_reference": "seamonkey-devel-0:1.0.9-0.48.el3.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.9-0.48.el3.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-dom-inspector-0:1.0.9-0.48.el3.i386" }, "product_reference": "seamonkey-dom-inspector-0:1.0.9-0.48.el3.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.9-0.48.el3.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-dom-inspector-0:1.0.9-0.48.el3.ia64" }, "product_reference": "seamonkey-dom-inspector-0:1.0.9-0.48.el3.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.9-0.48.el3.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-dom-inspector-0:1.0.9-0.48.el3.ppc" }, "product_reference": "seamonkey-dom-inspector-0:1.0.9-0.48.el3.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.9-0.48.el3.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-dom-inspector-0:1.0.9-0.48.el3.s390" }, "product_reference": "seamonkey-dom-inspector-0:1.0.9-0.48.el3.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.9-0.48.el3.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-dom-inspector-0:1.0.9-0.48.el3.s390x" }, "product_reference": "seamonkey-dom-inspector-0:1.0.9-0.48.el3.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.9-0.48.el3.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-dom-inspector-0:1.0.9-0.48.el3.x86_64" }, "product_reference": "seamonkey-dom-inspector-0:1.0.9-0.48.el3.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.9-0.48.el3.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-js-debugger-0:1.0.9-0.48.el3.i386" }, "product_reference": "seamonkey-js-debugger-0:1.0.9-0.48.el3.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.9-0.48.el3.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-js-debugger-0:1.0.9-0.48.el3.ia64" }, "product_reference": "seamonkey-js-debugger-0:1.0.9-0.48.el3.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.9-0.48.el3.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-js-debugger-0:1.0.9-0.48.el3.ppc" }, "product_reference": "seamonkey-js-debugger-0:1.0.9-0.48.el3.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.9-0.48.el3.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-js-debugger-0:1.0.9-0.48.el3.s390" }, "product_reference": "seamonkey-js-debugger-0:1.0.9-0.48.el3.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.9-0.48.el3.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-js-debugger-0:1.0.9-0.48.el3.s390x" }, "product_reference": "seamonkey-js-debugger-0:1.0.9-0.48.el3.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.9-0.48.el3.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-js-debugger-0:1.0.9-0.48.el3.x86_64" }, "product_reference": "seamonkey-js-debugger-0:1.0.9-0.48.el3.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.9-0.48.el3.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-mail-0:1.0.9-0.48.el3.i386" }, "product_reference": "seamonkey-mail-0:1.0.9-0.48.el3.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.9-0.48.el3.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-mail-0:1.0.9-0.48.el3.ia64" }, "product_reference": "seamonkey-mail-0:1.0.9-0.48.el3.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.9-0.48.el3.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-mail-0:1.0.9-0.48.el3.ppc" }, "product_reference": "seamonkey-mail-0:1.0.9-0.48.el3.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.9-0.48.el3.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-mail-0:1.0.9-0.48.el3.s390" }, "product_reference": "seamonkey-mail-0:1.0.9-0.48.el3.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.9-0.48.el3.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-mail-0:1.0.9-0.48.el3.s390x" }, "product_reference": "seamonkey-mail-0:1.0.9-0.48.el3.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.9-0.48.el3.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-mail-0:1.0.9-0.48.el3.x86_64" }, "product_reference": "seamonkey-mail-0:1.0.9-0.48.el3.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.9-0.48.el3.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nspr-0:1.0.9-0.48.el3.i386" }, "product_reference": "seamonkey-nspr-0:1.0.9-0.48.el3.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.9-0.48.el3.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nspr-0:1.0.9-0.48.el3.ia64" }, "product_reference": "seamonkey-nspr-0:1.0.9-0.48.el3.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.9-0.48.el3.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nspr-0:1.0.9-0.48.el3.ppc" }, "product_reference": "seamonkey-nspr-0:1.0.9-0.48.el3.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.9-0.48.el3.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nspr-0:1.0.9-0.48.el3.s390" }, "product_reference": "seamonkey-nspr-0:1.0.9-0.48.el3.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.9-0.48.el3.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nspr-0:1.0.9-0.48.el3.s390x" }, "product_reference": "seamonkey-nspr-0:1.0.9-0.48.el3.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.9-0.48.el3.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nspr-0:1.0.9-0.48.el3.x86_64" }, "product_reference": "seamonkey-nspr-0:1.0.9-0.48.el3.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.9-0.48.el3.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nspr-devel-0:1.0.9-0.48.el3.i386" }, "product_reference": "seamonkey-nspr-devel-0:1.0.9-0.48.el3.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.9-0.48.el3.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nspr-devel-0:1.0.9-0.48.el3.ia64" }, "product_reference": "seamonkey-nspr-devel-0:1.0.9-0.48.el3.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.9-0.48.el3.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nspr-devel-0:1.0.9-0.48.el3.ppc" }, "product_reference": "seamonkey-nspr-devel-0:1.0.9-0.48.el3.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.9-0.48.el3.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nspr-devel-0:1.0.9-0.48.el3.s390" }, "product_reference": "seamonkey-nspr-devel-0:1.0.9-0.48.el3.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.9-0.48.el3.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nspr-devel-0:1.0.9-0.48.el3.s390x" }, "product_reference": "seamonkey-nspr-devel-0:1.0.9-0.48.el3.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.9-0.48.el3.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nspr-devel-0:1.0.9-0.48.el3.x86_64" }, "product_reference": "seamonkey-nspr-devel-0:1.0.9-0.48.el3.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.9-0.48.el3.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nss-0:1.0.9-0.48.el3.i386" }, "product_reference": "seamonkey-nss-0:1.0.9-0.48.el3.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.9-0.48.el3.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nss-0:1.0.9-0.48.el3.ia64" }, "product_reference": "seamonkey-nss-0:1.0.9-0.48.el3.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.9-0.48.el3.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nss-0:1.0.9-0.48.el3.ppc" }, "product_reference": "seamonkey-nss-0:1.0.9-0.48.el3.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.9-0.48.el3.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nss-0:1.0.9-0.48.el3.s390" }, "product_reference": "seamonkey-nss-0:1.0.9-0.48.el3.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.9-0.48.el3.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nss-0:1.0.9-0.48.el3.s390x" }, "product_reference": "seamonkey-nss-0:1.0.9-0.48.el3.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.9-0.48.el3.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nss-0:1.0.9-0.48.el3.x86_64" }, "product_reference": "seamonkey-nss-0:1.0.9-0.48.el3.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.9-0.48.el3.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nss-devel-0:1.0.9-0.48.el3.i386" }, "product_reference": "seamonkey-nss-devel-0:1.0.9-0.48.el3.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.9-0.48.el3.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nss-devel-0:1.0.9-0.48.el3.ia64" }, "product_reference": "seamonkey-nss-devel-0:1.0.9-0.48.el3.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.9-0.48.el3.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nss-devel-0:1.0.9-0.48.el3.ppc" }, "product_reference": "seamonkey-nss-devel-0:1.0.9-0.48.el3.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.9-0.48.el3.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nss-devel-0:1.0.9-0.48.el3.s390" }, "product_reference": "seamonkey-nss-devel-0:1.0.9-0.48.el3.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.9-0.48.el3.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nss-devel-0:1.0.9-0.48.el3.s390x" }, "product_reference": "seamonkey-nss-devel-0:1.0.9-0.48.el3.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.9-0.48.el3.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nss-devel-0:1.0.9-0.48.el3.x86_64" }, "product_reference": "seamonkey-nss-devel-0:1.0.9-0.48.el3.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.9-51.el4_8.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-0:1.0.9-51.el4_8.i386" }, "product_reference": "seamonkey-0:1.0.9-51.el4_8.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.9-51.el4_8.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-0:1.0.9-51.el4_8.ia64" }, "product_reference": "seamonkey-0:1.0.9-51.el4_8.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.9-51.el4_8.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-0:1.0.9-51.el4_8.ppc" }, "product_reference": "seamonkey-0:1.0.9-51.el4_8.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.9-51.el4_8.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-0:1.0.9-51.el4_8.s390" }, "product_reference": "seamonkey-0:1.0.9-51.el4_8.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.9-51.el4_8.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-0:1.0.9-51.el4_8.s390x" }, "product_reference": "seamonkey-0:1.0.9-51.el4_8.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.9-51.el4_8.src as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-0:1.0.9-51.el4_8.src" }, "product_reference": "seamonkey-0:1.0.9-51.el4_8.src", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.9-51.el4_8.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-0:1.0.9-51.el4_8.x86_64" }, "product_reference": "seamonkey-0:1.0.9-51.el4_8.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.9-51.el4_8.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-chat-0:1.0.9-51.el4_8.i386" }, "product_reference": "seamonkey-chat-0:1.0.9-51.el4_8.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.9-51.el4_8.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-chat-0:1.0.9-51.el4_8.ia64" }, "product_reference": "seamonkey-chat-0:1.0.9-51.el4_8.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.9-51.el4_8.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-chat-0:1.0.9-51.el4_8.ppc" }, "product_reference": "seamonkey-chat-0:1.0.9-51.el4_8.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.9-51.el4_8.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-chat-0:1.0.9-51.el4_8.s390" }, "product_reference": "seamonkey-chat-0:1.0.9-51.el4_8.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.9-51.el4_8.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-chat-0:1.0.9-51.el4_8.s390x" }, "product_reference": "seamonkey-chat-0:1.0.9-51.el4_8.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.9-51.el4_8.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-chat-0:1.0.9-51.el4_8.x86_64" }, "product_reference": "seamonkey-chat-0:1.0.9-51.el4_8.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.9-51.el4_8.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-debuginfo-0:1.0.9-51.el4_8.i386" }, "product_reference": "seamonkey-debuginfo-0:1.0.9-51.el4_8.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.9-51.el4_8.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-debuginfo-0:1.0.9-51.el4_8.ia64" }, "product_reference": "seamonkey-debuginfo-0:1.0.9-51.el4_8.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.9-51.el4_8.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-debuginfo-0:1.0.9-51.el4_8.ppc" }, "product_reference": "seamonkey-debuginfo-0:1.0.9-51.el4_8.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.9-51.el4_8.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-debuginfo-0:1.0.9-51.el4_8.s390" }, "product_reference": "seamonkey-debuginfo-0:1.0.9-51.el4_8.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.9-51.el4_8.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-debuginfo-0:1.0.9-51.el4_8.s390x" }, "product_reference": "seamonkey-debuginfo-0:1.0.9-51.el4_8.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.9-51.el4_8.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-debuginfo-0:1.0.9-51.el4_8.x86_64" }, "product_reference": "seamonkey-debuginfo-0:1.0.9-51.el4_8.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.9-51.el4_8.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-devel-0:1.0.9-51.el4_8.i386" }, "product_reference": "seamonkey-devel-0:1.0.9-51.el4_8.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.9-51.el4_8.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-devel-0:1.0.9-51.el4_8.ia64" }, "product_reference": "seamonkey-devel-0:1.0.9-51.el4_8.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.9-51.el4_8.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-devel-0:1.0.9-51.el4_8.ppc" }, "product_reference": "seamonkey-devel-0:1.0.9-51.el4_8.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.9-51.el4_8.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-devel-0:1.0.9-51.el4_8.s390" }, "product_reference": "seamonkey-devel-0:1.0.9-51.el4_8.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.9-51.el4_8.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-devel-0:1.0.9-51.el4_8.s390x" }, "product_reference": "seamonkey-devel-0:1.0.9-51.el4_8.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.9-51.el4_8.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-devel-0:1.0.9-51.el4_8.x86_64" }, "product_reference": "seamonkey-devel-0:1.0.9-51.el4_8.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.9-51.el4_8.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-dom-inspector-0:1.0.9-51.el4_8.i386" }, "product_reference": "seamonkey-dom-inspector-0:1.0.9-51.el4_8.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.9-51.el4_8.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-dom-inspector-0:1.0.9-51.el4_8.ia64" }, "product_reference": "seamonkey-dom-inspector-0:1.0.9-51.el4_8.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.9-51.el4_8.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-dom-inspector-0:1.0.9-51.el4_8.ppc" }, "product_reference": "seamonkey-dom-inspector-0:1.0.9-51.el4_8.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.9-51.el4_8.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-dom-inspector-0:1.0.9-51.el4_8.s390" }, "product_reference": "seamonkey-dom-inspector-0:1.0.9-51.el4_8.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.9-51.el4_8.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-dom-inspector-0:1.0.9-51.el4_8.s390x" }, "product_reference": "seamonkey-dom-inspector-0:1.0.9-51.el4_8.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.9-51.el4_8.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-dom-inspector-0:1.0.9-51.el4_8.x86_64" }, "product_reference": "seamonkey-dom-inspector-0:1.0.9-51.el4_8.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.9-51.el4_8.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-js-debugger-0:1.0.9-51.el4_8.i386" }, "product_reference": "seamonkey-js-debugger-0:1.0.9-51.el4_8.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.9-51.el4_8.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-js-debugger-0:1.0.9-51.el4_8.ia64" }, "product_reference": "seamonkey-js-debugger-0:1.0.9-51.el4_8.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.9-51.el4_8.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-js-debugger-0:1.0.9-51.el4_8.ppc" }, "product_reference": "seamonkey-js-debugger-0:1.0.9-51.el4_8.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.9-51.el4_8.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-js-debugger-0:1.0.9-51.el4_8.s390" }, "product_reference": "seamonkey-js-debugger-0:1.0.9-51.el4_8.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.9-51.el4_8.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-js-debugger-0:1.0.9-51.el4_8.s390x" }, "product_reference": "seamonkey-js-debugger-0:1.0.9-51.el4_8.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.9-51.el4_8.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-js-debugger-0:1.0.9-51.el4_8.x86_64" }, "product_reference": "seamonkey-js-debugger-0:1.0.9-51.el4_8.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.9-51.el4_8.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-mail-0:1.0.9-51.el4_8.i386" }, "product_reference": "seamonkey-mail-0:1.0.9-51.el4_8.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.9-51.el4_8.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-mail-0:1.0.9-51.el4_8.ia64" }, "product_reference": "seamonkey-mail-0:1.0.9-51.el4_8.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.9-51.el4_8.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-mail-0:1.0.9-51.el4_8.ppc" }, "product_reference": "seamonkey-mail-0:1.0.9-51.el4_8.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.9-51.el4_8.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-mail-0:1.0.9-51.el4_8.s390" }, "product_reference": "seamonkey-mail-0:1.0.9-51.el4_8.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.9-51.el4_8.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-mail-0:1.0.9-51.el4_8.s390x" }, "product_reference": "seamonkey-mail-0:1.0.9-51.el4_8.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.9-51.el4_8.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-mail-0:1.0.9-51.el4_8.x86_64" }, "product_reference": "seamonkey-mail-0:1.0.9-51.el4_8.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.9-51.el4_8.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-0:1.0.9-51.el4_8.i386" }, "product_reference": "seamonkey-0:1.0.9-51.el4_8.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.9-51.el4_8.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-0:1.0.9-51.el4_8.ia64" }, "product_reference": "seamonkey-0:1.0.9-51.el4_8.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.9-51.el4_8.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-0:1.0.9-51.el4_8.ppc" }, "product_reference": "seamonkey-0:1.0.9-51.el4_8.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.9-51.el4_8.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-0:1.0.9-51.el4_8.s390" }, "product_reference": "seamonkey-0:1.0.9-51.el4_8.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.9-51.el4_8.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-0:1.0.9-51.el4_8.s390x" }, "product_reference": "seamonkey-0:1.0.9-51.el4_8.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.9-51.el4_8.src as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-0:1.0.9-51.el4_8.src" }, "product_reference": "seamonkey-0:1.0.9-51.el4_8.src", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.9-51.el4_8.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-0:1.0.9-51.el4_8.x86_64" }, "product_reference": "seamonkey-0:1.0.9-51.el4_8.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.9-51.el4_8.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-chat-0:1.0.9-51.el4_8.i386" }, "product_reference": "seamonkey-chat-0:1.0.9-51.el4_8.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.9-51.el4_8.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-chat-0:1.0.9-51.el4_8.ia64" }, "product_reference": "seamonkey-chat-0:1.0.9-51.el4_8.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.9-51.el4_8.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-chat-0:1.0.9-51.el4_8.ppc" }, "product_reference": "seamonkey-chat-0:1.0.9-51.el4_8.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.9-51.el4_8.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-chat-0:1.0.9-51.el4_8.s390" }, "product_reference": "seamonkey-chat-0:1.0.9-51.el4_8.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.9-51.el4_8.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-chat-0:1.0.9-51.el4_8.s390x" }, "product_reference": "seamonkey-chat-0:1.0.9-51.el4_8.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.9-51.el4_8.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-chat-0:1.0.9-51.el4_8.x86_64" }, "product_reference": "seamonkey-chat-0:1.0.9-51.el4_8.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.9-51.el4_8.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-debuginfo-0:1.0.9-51.el4_8.i386" }, "product_reference": "seamonkey-debuginfo-0:1.0.9-51.el4_8.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.9-51.el4_8.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-debuginfo-0:1.0.9-51.el4_8.ia64" }, "product_reference": "seamonkey-debuginfo-0:1.0.9-51.el4_8.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.9-51.el4_8.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-debuginfo-0:1.0.9-51.el4_8.ppc" }, "product_reference": "seamonkey-debuginfo-0:1.0.9-51.el4_8.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.9-51.el4_8.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-debuginfo-0:1.0.9-51.el4_8.s390" }, "product_reference": "seamonkey-debuginfo-0:1.0.9-51.el4_8.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.9-51.el4_8.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-debuginfo-0:1.0.9-51.el4_8.s390x" }, "product_reference": "seamonkey-debuginfo-0:1.0.9-51.el4_8.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.9-51.el4_8.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-debuginfo-0:1.0.9-51.el4_8.x86_64" }, "product_reference": "seamonkey-debuginfo-0:1.0.9-51.el4_8.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.9-51.el4_8.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-devel-0:1.0.9-51.el4_8.i386" }, "product_reference": "seamonkey-devel-0:1.0.9-51.el4_8.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.9-51.el4_8.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-devel-0:1.0.9-51.el4_8.ia64" }, "product_reference": "seamonkey-devel-0:1.0.9-51.el4_8.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.9-51.el4_8.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-devel-0:1.0.9-51.el4_8.ppc" }, "product_reference": "seamonkey-devel-0:1.0.9-51.el4_8.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.9-51.el4_8.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-devel-0:1.0.9-51.el4_8.s390" }, "product_reference": "seamonkey-devel-0:1.0.9-51.el4_8.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.9-51.el4_8.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-devel-0:1.0.9-51.el4_8.s390x" }, "product_reference": "seamonkey-devel-0:1.0.9-51.el4_8.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.9-51.el4_8.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-devel-0:1.0.9-51.el4_8.x86_64" }, "product_reference": "seamonkey-devel-0:1.0.9-51.el4_8.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.9-51.el4_8.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-dom-inspector-0:1.0.9-51.el4_8.i386" }, "product_reference": "seamonkey-dom-inspector-0:1.0.9-51.el4_8.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.9-51.el4_8.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-dom-inspector-0:1.0.9-51.el4_8.ia64" }, "product_reference": "seamonkey-dom-inspector-0:1.0.9-51.el4_8.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.9-51.el4_8.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-dom-inspector-0:1.0.9-51.el4_8.ppc" }, "product_reference": "seamonkey-dom-inspector-0:1.0.9-51.el4_8.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.9-51.el4_8.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-dom-inspector-0:1.0.9-51.el4_8.s390" }, "product_reference": "seamonkey-dom-inspector-0:1.0.9-51.el4_8.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.9-51.el4_8.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-dom-inspector-0:1.0.9-51.el4_8.s390x" }, "product_reference": "seamonkey-dom-inspector-0:1.0.9-51.el4_8.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.9-51.el4_8.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-dom-inspector-0:1.0.9-51.el4_8.x86_64" }, "product_reference": "seamonkey-dom-inspector-0:1.0.9-51.el4_8.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.9-51.el4_8.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-js-debugger-0:1.0.9-51.el4_8.i386" }, "product_reference": "seamonkey-js-debugger-0:1.0.9-51.el4_8.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.9-51.el4_8.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-js-debugger-0:1.0.9-51.el4_8.ia64" }, "product_reference": "seamonkey-js-debugger-0:1.0.9-51.el4_8.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.9-51.el4_8.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-js-debugger-0:1.0.9-51.el4_8.ppc" }, "product_reference": "seamonkey-js-debugger-0:1.0.9-51.el4_8.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.9-51.el4_8.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-js-debugger-0:1.0.9-51.el4_8.s390" }, "product_reference": "seamonkey-js-debugger-0:1.0.9-51.el4_8.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.9-51.el4_8.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-js-debugger-0:1.0.9-51.el4_8.s390x" }, "product_reference": "seamonkey-js-debugger-0:1.0.9-51.el4_8.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.9-51.el4_8.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-js-debugger-0:1.0.9-51.el4_8.x86_64" }, "product_reference": "seamonkey-js-debugger-0:1.0.9-51.el4_8.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.9-51.el4_8.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-mail-0:1.0.9-51.el4_8.i386" }, "product_reference": "seamonkey-mail-0:1.0.9-51.el4_8.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.9-51.el4_8.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-mail-0:1.0.9-51.el4_8.ia64" }, "product_reference": "seamonkey-mail-0:1.0.9-51.el4_8.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.9-51.el4_8.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-mail-0:1.0.9-51.el4_8.ppc" }, "product_reference": "seamonkey-mail-0:1.0.9-51.el4_8.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.9-51.el4_8.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-mail-0:1.0.9-51.el4_8.s390" }, "product_reference": "seamonkey-mail-0:1.0.9-51.el4_8.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.9-51.el4_8.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-mail-0:1.0.9-51.el4_8.s390x" }, "product_reference": "seamonkey-mail-0:1.0.9-51.el4_8.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.9-51.el4_8.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-mail-0:1.0.9-51.el4_8.x86_64" }, "product_reference": "seamonkey-mail-0:1.0.9-51.el4_8.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.9-51.el4_8.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-0:1.0.9-51.el4_8.i386" }, "product_reference": "seamonkey-0:1.0.9-51.el4_8.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.9-51.el4_8.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-0:1.0.9-51.el4_8.ia64" }, "product_reference": "seamonkey-0:1.0.9-51.el4_8.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.9-51.el4_8.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-0:1.0.9-51.el4_8.ppc" }, "product_reference": "seamonkey-0:1.0.9-51.el4_8.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.9-51.el4_8.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-0:1.0.9-51.el4_8.s390" }, "product_reference": "seamonkey-0:1.0.9-51.el4_8.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.9-51.el4_8.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-0:1.0.9-51.el4_8.s390x" }, "product_reference": "seamonkey-0:1.0.9-51.el4_8.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.9-51.el4_8.src as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-0:1.0.9-51.el4_8.src" }, "product_reference": "seamonkey-0:1.0.9-51.el4_8.src", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.9-51.el4_8.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-0:1.0.9-51.el4_8.x86_64" }, "product_reference": "seamonkey-0:1.0.9-51.el4_8.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.9-51.el4_8.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-chat-0:1.0.9-51.el4_8.i386" }, "product_reference": "seamonkey-chat-0:1.0.9-51.el4_8.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.9-51.el4_8.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-chat-0:1.0.9-51.el4_8.ia64" }, "product_reference": "seamonkey-chat-0:1.0.9-51.el4_8.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.9-51.el4_8.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-chat-0:1.0.9-51.el4_8.ppc" }, "product_reference": "seamonkey-chat-0:1.0.9-51.el4_8.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.9-51.el4_8.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-chat-0:1.0.9-51.el4_8.s390" }, "product_reference": "seamonkey-chat-0:1.0.9-51.el4_8.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.9-51.el4_8.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-chat-0:1.0.9-51.el4_8.s390x" }, "product_reference": "seamonkey-chat-0:1.0.9-51.el4_8.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.9-51.el4_8.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-chat-0:1.0.9-51.el4_8.x86_64" }, "product_reference": "seamonkey-chat-0:1.0.9-51.el4_8.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.9-51.el4_8.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-debuginfo-0:1.0.9-51.el4_8.i386" }, "product_reference": "seamonkey-debuginfo-0:1.0.9-51.el4_8.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.9-51.el4_8.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-debuginfo-0:1.0.9-51.el4_8.ia64" }, "product_reference": "seamonkey-debuginfo-0:1.0.9-51.el4_8.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.9-51.el4_8.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-debuginfo-0:1.0.9-51.el4_8.ppc" }, "product_reference": "seamonkey-debuginfo-0:1.0.9-51.el4_8.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.9-51.el4_8.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-debuginfo-0:1.0.9-51.el4_8.s390" }, "product_reference": "seamonkey-debuginfo-0:1.0.9-51.el4_8.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.9-51.el4_8.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-debuginfo-0:1.0.9-51.el4_8.s390x" }, "product_reference": "seamonkey-debuginfo-0:1.0.9-51.el4_8.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.9-51.el4_8.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-debuginfo-0:1.0.9-51.el4_8.x86_64" }, "product_reference": "seamonkey-debuginfo-0:1.0.9-51.el4_8.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.9-51.el4_8.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-devel-0:1.0.9-51.el4_8.i386" }, "product_reference": "seamonkey-devel-0:1.0.9-51.el4_8.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.9-51.el4_8.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-devel-0:1.0.9-51.el4_8.ia64" }, "product_reference": "seamonkey-devel-0:1.0.9-51.el4_8.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.9-51.el4_8.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-devel-0:1.0.9-51.el4_8.ppc" }, "product_reference": "seamonkey-devel-0:1.0.9-51.el4_8.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.9-51.el4_8.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-devel-0:1.0.9-51.el4_8.s390" }, "product_reference": "seamonkey-devel-0:1.0.9-51.el4_8.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.9-51.el4_8.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-devel-0:1.0.9-51.el4_8.s390x" }, "product_reference": "seamonkey-devel-0:1.0.9-51.el4_8.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.9-51.el4_8.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-devel-0:1.0.9-51.el4_8.x86_64" }, "product_reference": "seamonkey-devel-0:1.0.9-51.el4_8.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.9-51.el4_8.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-dom-inspector-0:1.0.9-51.el4_8.i386" }, "product_reference": "seamonkey-dom-inspector-0:1.0.9-51.el4_8.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.9-51.el4_8.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-dom-inspector-0:1.0.9-51.el4_8.ia64" }, "product_reference": "seamonkey-dom-inspector-0:1.0.9-51.el4_8.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.9-51.el4_8.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-dom-inspector-0:1.0.9-51.el4_8.ppc" }, "product_reference": "seamonkey-dom-inspector-0:1.0.9-51.el4_8.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.9-51.el4_8.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-dom-inspector-0:1.0.9-51.el4_8.s390" }, "product_reference": "seamonkey-dom-inspector-0:1.0.9-51.el4_8.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.9-51.el4_8.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-dom-inspector-0:1.0.9-51.el4_8.s390x" }, "product_reference": "seamonkey-dom-inspector-0:1.0.9-51.el4_8.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.9-51.el4_8.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-dom-inspector-0:1.0.9-51.el4_8.x86_64" }, "product_reference": "seamonkey-dom-inspector-0:1.0.9-51.el4_8.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.9-51.el4_8.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-js-debugger-0:1.0.9-51.el4_8.i386" }, "product_reference": "seamonkey-js-debugger-0:1.0.9-51.el4_8.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.9-51.el4_8.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-js-debugger-0:1.0.9-51.el4_8.ia64" }, "product_reference": "seamonkey-js-debugger-0:1.0.9-51.el4_8.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.9-51.el4_8.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-js-debugger-0:1.0.9-51.el4_8.ppc" }, "product_reference": "seamonkey-js-debugger-0:1.0.9-51.el4_8.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.9-51.el4_8.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-js-debugger-0:1.0.9-51.el4_8.s390" }, "product_reference": "seamonkey-js-debugger-0:1.0.9-51.el4_8.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.9-51.el4_8.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-js-debugger-0:1.0.9-51.el4_8.s390x" }, "product_reference": "seamonkey-js-debugger-0:1.0.9-51.el4_8.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.9-51.el4_8.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-js-debugger-0:1.0.9-51.el4_8.x86_64" }, "product_reference": "seamonkey-js-debugger-0:1.0.9-51.el4_8.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.9-51.el4_8.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-mail-0:1.0.9-51.el4_8.i386" }, "product_reference": "seamonkey-mail-0:1.0.9-51.el4_8.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.9-51.el4_8.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-mail-0:1.0.9-51.el4_8.ia64" }, "product_reference": "seamonkey-mail-0:1.0.9-51.el4_8.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.9-51.el4_8.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-mail-0:1.0.9-51.el4_8.ppc" }, "product_reference": "seamonkey-mail-0:1.0.9-51.el4_8.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.9-51.el4_8.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-mail-0:1.0.9-51.el4_8.s390" }, "product_reference": "seamonkey-mail-0:1.0.9-51.el4_8.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.9-51.el4_8.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-mail-0:1.0.9-51.el4_8.s390x" }, "product_reference": "seamonkey-mail-0:1.0.9-51.el4_8.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.9-51.el4_8.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-mail-0:1.0.9-51.el4_8.x86_64" }, "product_reference": "seamonkey-mail-0:1.0.9-51.el4_8.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.9-51.el4_8.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-0:1.0.9-51.el4_8.i386" }, "product_reference": "seamonkey-0:1.0.9-51.el4_8.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.9-51.el4_8.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-0:1.0.9-51.el4_8.ia64" }, "product_reference": "seamonkey-0:1.0.9-51.el4_8.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.9-51.el4_8.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-0:1.0.9-51.el4_8.ppc" }, "product_reference": "seamonkey-0:1.0.9-51.el4_8.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.9-51.el4_8.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-0:1.0.9-51.el4_8.s390" }, "product_reference": "seamonkey-0:1.0.9-51.el4_8.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.9-51.el4_8.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-0:1.0.9-51.el4_8.s390x" }, "product_reference": "seamonkey-0:1.0.9-51.el4_8.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.9-51.el4_8.src as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-0:1.0.9-51.el4_8.src" }, "product_reference": "seamonkey-0:1.0.9-51.el4_8.src", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.9-51.el4_8.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-0:1.0.9-51.el4_8.x86_64" }, "product_reference": "seamonkey-0:1.0.9-51.el4_8.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.9-51.el4_8.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-chat-0:1.0.9-51.el4_8.i386" }, "product_reference": "seamonkey-chat-0:1.0.9-51.el4_8.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.9-51.el4_8.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-chat-0:1.0.9-51.el4_8.ia64" }, "product_reference": "seamonkey-chat-0:1.0.9-51.el4_8.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.9-51.el4_8.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-chat-0:1.0.9-51.el4_8.ppc" }, "product_reference": "seamonkey-chat-0:1.0.9-51.el4_8.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.9-51.el4_8.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-chat-0:1.0.9-51.el4_8.s390" }, "product_reference": "seamonkey-chat-0:1.0.9-51.el4_8.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.9-51.el4_8.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-chat-0:1.0.9-51.el4_8.s390x" }, "product_reference": "seamonkey-chat-0:1.0.9-51.el4_8.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.9-51.el4_8.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-chat-0:1.0.9-51.el4_8.x86_64" }, "product_reference": "seamonkey-chat-0:1.0.9-51.el4_8.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.9-51.el4_8.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-debuginfo-0:1.0.9-51.el4_8.i386" }, "product_reference": "seamonkey-debuginfo-0:1.0.9-51.el4_8.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.9-51.el4_8.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-debuginfo-0:1.0.9-51.el4_8.ia64" }, "product_reference": "seamonkey-debuginfo-0:1.0.9-51.el4_8.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.9-51.el4_8.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-debuginfo-0:1.0.9-51.el4_8.ppc" }, "product_reference": "seamonkey-debuginfo-0:1.0.9-51.el4_8.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.9-51.el4_8.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-debuginfo-0:1.0.9-51.el4_8.s390" }, "product_reference": "seamonkey-debuginfo-0:1.0.9-51.el4_8.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.9-51.el4_8.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-debuginfo-0:1.0.9-51.el4_8.s390x" }, "product_reference": "seamonkey-debuginfo-0:1.0.9-51.el4_8.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.9-51.el4_8.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-debuginfo-0:1.0.9-51.el4_8.x86_64" }, "product_reference": "seamonkey-debuginfo-0:1.0.9-51.el4_8.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.9-51.el4_8.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-devel-0:1.0.9-51.el4_8.i386" }, "product_reference": "seamonkey-devel-0:1.0.9-51.el4_8.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.9-51.el4_8.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-devel-0:1.0.9-51.el4_8.ia64" }, "product_reference": "seamonkey-devel-0:1.0.9-51.el4_8.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.9-51.el4_8.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-devel-0:1.0.9-51.el4_8.ppc" }, "product_reference": "seamonkey-devel-0:1.0.9-51.el4_8.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.9-51.el4_8.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-devel-0:1.0.9-51.el4_8.s390" }, "product_reference": "seamonkey-devel-0:1.0.9-51.el4_8.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.9-51.el4_8.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-devel-0:1.0.9-51.el4_8.s390x" }, "product_reference": "seamonkey-devel-0:1.0.9-51.el4_8.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.9-51.el4_8.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-devel-0:1.0.9-51.el4_8.x86_64" }, "product_reference": "seamonkey-devel-0:1.0.9-51.el4_8.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.9-51.el4_8.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-dom-inspector-0:1.0.9-51.el4_8.i386" }, "product_reference": "seamonkey-dom-inspector-0:1.0.9-51.el4_8.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.9-51.el4_8.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-dom-inspector-0:1.0.9-51.el4_8.ia64" }, "product_reference": "seamonkey-dom-inspector-0:1.0.9-51.el4_8.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.9-51.el4_8.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-dom-inspector-0:1.0.9-51.el4_8.ppc" }, "product_reference": "seamonkey-dom-inspector-0:1.0.9-51.el4_8.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.9-51.el4_8.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-dom-inspector-0:1.0.9-51.el4_8.s390" }, "product_reference": "seamonkey-dom-inspector-0:1.0.9-51.el4_8.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.9-51.el4_8.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-dom-inspector-0:1.0.9-51.el4_8.s390x" }, "product_reference": "seamonkey-dom-inspector-0:1.0.9-51.el4_8.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.9-51.el4_8.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-dom-inspector-0:1.0.9-51.el4_8.x86_64" }, "product_reference": "seamonkey-dom-inspector-0:1.0.9-51.el4_8.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.9-51.el4_8.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-js-debugger-0:1.0.9-51.el4_8.i386" }, "product_reference": "seamonkey-js-debugger-0:1.0.9-51.el4_8.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.9-51.el4_8.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-js-debugger-0:1.0.9-51.el4_8.ia64" }, "product_reference": "seamonkey-js-debugger-0:1.0.9-51.el4_8.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.9-51.el4_8.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-js-debugger-0:1.0.9-51.el4_8.ppc" }, "product_reference": "seamonkey-js-debugger-0:1.0.9-51.el4_8.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.9-51.el4_8.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-js-debugger-0:1.0.9-51.el4_8.s390" }, "product_reference": "seamonkey-js-debugger-0:1.0.9-51.el4_8.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.9-51.el4_8.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-js-debugger-0:1.0.9-51.el4_8.s390x" }, "product_reference": "seamonkey-js-debugger-0:1.0.9-51.el4_8.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.9-51.el4_8.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-js-debugger-0:1.0.9-51.el4_8.x86_64" }, "product_reference": "seamonkey-js-debugger-0:1.0.9-51.el4_8.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.9-51.el4_8.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-mail-0:1.0.9-51.el4_8.i386" }, "product_reference": "seamonkey-mail-0:1.0.9-51.el4_8.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.9-51.el4_8.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-mail-0:1.0.9-51.el4_8.ia64" }, "product_reference": "seamonkey-mail-0:1.0.9-51.el4_8.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.9-51.el4_8.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-mail-0:1.0.9-51.el4_8.ppc" }, "product_reference": "seamonkey-mail-0:1.0.9-51.el4_8.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.9-51.el4_8.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-mail-0:1.0.9-51.el4_8.s390" }, "product_reference": "seamonkey-mail-0:1.0.9-51.el4_8.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.9-51.el4_8.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-mail-0:1.0.9-51.el4_8.s390x" }, "product_reference": "seamonkey-mail-0:1.0.9-51.el4_8.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.9-51.el4_8.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-mail-0:1.0.9-51.el4_8.x86_64" }, "product_reference": "seamonkey-mail-0:1.0.9-51.el4_8.x86_64", "relates_to_product_reference": "4WS" } ] }, "vulnerabilities": [ { "cve": "CVE-2009-3979", "discovery_date": "2009-12-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "546694" } ], "notes": [ { "category": "description", "text": "Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.0.16 and 3.5.x before 3.5.6, SeaMonkey before 2.0.1, and Thunderbird allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.", "title": "Vulnerability description" }, { "category": "summary", "text": "Mozilla crash with evidence of memory corruption", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "3AS:seamonkey-0:1.0.9-0.48.el3.i386", "3AS:seamonkey-0:1.0.9-0.48.el3.ia64", "3AS:seamonkey-0:1.0.9-0.48.el3.ppc", "3AS:seamonkey-0:1.0.9-0.48.el3.s390", "3AS:seamonkey-0:1.0.9-0.48.el3.s390x", "3AS:seamonkey-0:1.0.9-0.48.el3.src", "3AS:seamonkey-0:1.0.9-0.48.el3.x86_64", "3AS:seamonkey-chat-0:1.0.9-0.48.el3.i386", "3AS:seamonkey-chat-0:1.0.9-0.48.el3.ia64", "3AS:seamonkey-chat-0:1.0.9-0.48.el3.ppc", "3AS:seamonkey-chat-0:1.0.9-0.48.el3.s390", "3AS:seamonkey-chat-0:1.0.9-0.48.el3.s390x", "3AS:seamonkey-chat-0:1.0.9-0.48.el3.x86_64", "3AS:seamonkey-debuginfo-0:1.0.9-0.48.el3.i386", "3AS:seamonkey-debuginfo-0:1.0.9-0.48.el3.ia64", "3AS:seamonkey-debuginfo-0:1.0.9-0.48.el3.ppc", "3AS:seamonkey-debuginfo-0:1.0.9-0.48.el3.s390", "3AS:seamonkey-debuginfo-0:1.0.9-0.48.el3.s390x", "3AS:seamonkey-debuginfo-0:1.0.9-0.48.el3.x86_64", "3AS:seamonkey-devel-0:1.0.9-0.48.el3.i386", "3AS:seamonkey-devel-0:1.0.9-0.48.el3.ia64", "3AS:seamonkey-devel-0:1.0.9-0.48.el3.ppc", "3AS:seamonkey-devel-0:1.0.9-0.48.el3.s390", "3AS:seamonkey-devel-0:1.0.9-0.48.el3.s390x", "3AS:seamonkey-devel-0:1.0.9-0.48.el3.x86_64", "3AS:seamonkey-dom-inspector-0:1.0.9-0.48.el3.i386", "3AS:seamonkey-dom-inspector-0:1.0.9-0.48.el3.ia64", "3AS:seamonkey-dom-inspector-0:1.0.9-0.48.el3.ppc", "3AS:seamonkey-dom-inspector-0:1.0.9-0.48.el3.s390", "3AS:seamonkey-dom-inspector-0:1.0.9-0.48.el3.s390x", "3AS:seamonkey-dom-inspector-0:1.0.9-0.48.el3.x86_64", "3AS:seamonkey-js-debugger-0:1.0.9-0.48.el3.i386", "3AS:seamonkey-js-debugger-0:1.0.9-0.48.el3.ia64", "3AS:seamonkey-js-debugger-0:1.0.9-0.48.el3.ppc", "3AS:seamonkey-js-debugger-0:1.0.9-0.48.el3.s390", "3AS:seamonkey-js-debugger-0:1.0.9-0.48.el3.s390x", "3AS:seamonkey-js-debugger-0:1.0.9-0.48.el3.x86_64", "3AS:seamonkey-mail-0:1.0.9-0.48.el3.i386", "3AS:seamonkey-mail-0:1.0.9-0.48.el3.ia64", "3AS:seamonkey-mail-0:1.0.9-0.48.el3.ppc", "3AS:seamonkey-mail-0:1.0.9-0.48.el3.s390", "3AS:seamonkey-mail-0:1.0.9-0.48.el3.s390x", "3AS:seamonkey-mail-0:1.0.9-0.48.el3.x86_64", "3AS:seamonkey-nspr-0:1.0.9-0.48.el3.i386", "3AS:seamonkey-nspr-0:1.0.9-0.48.el3.ia64", "3AS:seamonkey-nspr-0:1.0.9-0.48.el3.ppc", "3AS:seamonkey-nspr-0:1.0.9-0.48.el3.s390", "3AS:seamonkey-nspr-0:1.0.9-0.48.el3.s390x", "3AS:seamonkey-nspr-0:1.0.9-0.48.el3.x86_64", "3AS:seamonkey-nspr-devel-0:1.0.9-0.48.el3.i386", "3AS:seamonkey-nspr-devel-0:1.0.9-0.48.el3.ia64", "3AS:seamonkey-nspr-devel-0:1.0.9-0.48.el3.ppc", "3AS:seamonkey-nspr-devel-0:1.0.9-0.48.el3.s390", "3AS:seamonkey-nspr-devel-0:1.0.9-0.48.el3.s390x", "3AS:seamonkey-nspr-devel-0:1.0.9-0.48.el3.x86_64", "3AS:seamonkey-nss-0:1.0.9-0.48.el3.i386", "3AS:seamonkey-nss-0:1.0.9-0.48.el3.ia64", "3AS:seamonkey-nss-0:1.0.9-0.48.el3.ppc", "3AS:seamonkey-nss-0:1.0.9-0.48.el3.s390", "3AS:seamonkey-nss-0:1.0.9-0.48.el3.s390x", "3AS:seamonkey-nss-0:1.0.9-0.48.el3.x86_64", "3AS:seamonkey-nss-devel-0:1.0.9-0.48.el3.i386", "3AS:seamonkey-nss-devel-0:1.0.9-0.48.el3.ia64", "3AS:seamonkey-nss-devel-0:1.0.9-0.48.el3.ppc", "3AS:seamonkey-nss-devel-0:1.0.9-0.48.el3.s390", "3AS:seamonkey-nss-devel-0:1.0.9-0.48.el3.s390x", "3AS:seamonkey-nss-devel-0:1.0.9-0.48.el3.x86_64", "3Desktop:seamonkey-0:1.0.9-0.48.el3.i386", "3Desktop:seamonkey-0:1.0.9-0.48.el3.ia64", "3Desktop:seamonkey-0:1.0.9-0.48.el3.ppc", "3Desktop:seamonkey-0:1.0.9-0.48.el3.s390", "3Desktop:seamonkey-0:1.0.9-0.48.el3.s390x", "3Desktop:seamonkey-0:1.0.9-0.48.el3.src", "3Desktop:seamonkey-0:1.0.9-0.48.el3.x86_64", "3Desktop:seamonkey-chat-0:1.0.9-0.48.el3.i386", "3Desktop:seamonkey-chat-0:1.0.9-0.48.el3.ia64", "3Desktop:seamonkey-chat-0:1.0.9-0.48.el3.ppc", "3Desktop:seamonkey-chat-0:1.0.9-0.48.el3.s390", "3Desktop:seamonkey-chat-0:1.0.9-0.48.el3.s390x", "3Desktop:seamonkey-chat-0:1.0.9-0.48.el3.x86_64", "3Desktop:seamonkey-debuginfo-0:1.0.9-0.48.el3.i386", "3Desktop:seamonkey-debuginfo-0:1.0.9-0.48.el3.ia64", "3Desktop:seamonkey-debuginfo-0:1.0.9-0.48.el3.ppc", "3Desktop:seamonkey-debuginfo-0:1.0.9-0.48.el3.s390", "3Desktop:seamonkey-debuginfo-0:1.0.9-0.48.el3.s390x", "3Desktop:seamonkey-debuginfo-0:1.0.9-0.48.el3.x86_64", "3Desktop:seamonkey-devel-0:1.0.9-0.48.el3.i386", "3Desktop:seamonkey-devel-0:1.0.9-0.48.el3.ia64", "3Desktop:seamonkey-devel-0:1.0.9-0.48.el3.ppc", "3Desktop:seamonkey-devel-0:1.0.9-0.48.el3.s390", "3Desktop:seamonkey-devel-0:1.0.9-0.48.el3.s390x", "3Desktop:seamonkey-devel-0:1.0.9-0.48.el3.x86_64", "3Desktop:seamonkey-dom-inspector-0:1.0.9-0.48.el3.i386", "3Desktop:seamonkey-dom-inspector-0:1.0.9-0.48.el3.ia64", "3Desktop:seamonkey-dom-inspector-0:1.0.9-0.48.el3.ppc", "3Desktop:seamonkey-dom-inspector-0:1.0.9-0.48.el3.s390", "3Desktop:seamonkey-dom-inspector-0:1.0.9-0.48.el3.s390x", "3Desktop:seamonkey-dom-inspector-0:1.0.9-0.48.el3.x86_64", "3Desktop:seamonkey-js-debugger-0:1.0.9-0.48.el3.i386", "3Desktop:seamonkey-js-debugger-0:1.0.9-0.48.el3.ia64", "3Desktop:seamonkey-js-debugger-0:1.0.9-0.48.el3.ppc", "3Desktop:seamonkey-js-debugger-0:1.0.9-0.48.el3.s390", "3Desktop:seamonkey-js-debugger-0:1.0.9-0.48.el3.s390x", "3Desktop:seamonkey-js-debugger-0:1.0.9-0.48.el3.x86_64", "3Desktop:seamonkey-mail-0:1.0.9-0.48.el3.i386", "3Desktop:seamonkey-mail-0:1.0.9-0.48.el3.ia64", "3Desktop:seamonkey-mail-0:1.0.9-0.48.el3.ppc", "3Desktop:seamonkey-mail-0:1.0.9-0.48.el3.s390", "3Desktop:seamonkey-mail-0:1.0.9-0.48.el3.s390x", "3Desktop:seamonkey-mail-0:1.0.9-0.48.el3.x86_64", "3Desktop:seamonkey-nspr-0:1.0.9-0.48.el3.i386", "3Desktop:seamonkey-nspr-0:1.0.9-0.48.el3.ia64", "3Desktop:seamonkey-nspr-0:1.0.9-0.48.el3.ppc", "3Desktop:seamonkey-nspr-0:1.0.9-0.48.el3.s390", "3Desktop:seamonkey-nspr-0:1.0.9-0.48.el3.s390x", "3Desktop:seamonkey-nspr-0:1.0.9-0.48.el3.x86_64", "3Desktop:seamonkey-nspr-devel-0:1.0.9-0.48.el3.i386", "3Desktop:seamonkey-nspr-devel-0:1.0.9-0.48.el3.ia64", "3Desktop:seamonkey-nspr-devel-0:1.0.9-0.48.el3.ppc", "3Desktop:seamonkey-nspr-devel-0:1.0.9-0.48.el3.s390", "3Desktop:seamonkey-nspr-devel-0:1.0.9-0.48.el3.s390x", "3Desktop:seamonkey-nspr-devel-0:1.0.9-0.48.el3.x86_64", "3Desktop:seamonkey-nss-0:1.0.9-0.48.el3.i386", "3Desktop:seamonkey-nss-0:1.0.9-0.48.el3.ia64", "3Desktop:seamonkey-nss-0:1.0.9-0.48.el3.ppc", "3Desktop:seamonkey-nss-0:1.0.9-0.48.el3.s390", "3Desktop:seamonkey-nss-0:1.0.9-0.48.el3.s390x", "3Desktop:seamonkey-nss-0:1.0.9-0.48.el3.x86_64", "3Desktop:seamonkey-nss-devel-0:1.0.9-0.48.el3.i386", "3Desktop:seamonkey-nss-devel-0:1.0.9-0.48.el3.ia64", "3Desktop:seamonkey-nss-devel-0:1.0.9-0.48.el3.ppc", "3Desktop:seamonkey-nss-devel-0:1.0.9-0.48.el3.s390", "3Desktop:seamonkey-nss-devel-0:1.0.9-0.48.el3.s390x", "3Desktop:seamonkey-nss-devel-0:1.0.9-0.48.el3.x86_64", "3ES:seamonkey-0:1.0.9-0.48.el3.i386", "3ES:seamonkey-0:1.0.9-0.48.el3.ia64", "3ES:seamonkey-0:1.0.9-0.48.el3.ppc", "3ES:seamonkey-0:1.0.9-0.48.el3.s390", "3ES:seamonkey-0:1.0.9-0.48.el3.s390x", "3ES:seamonkey-0:1.0.9-0.48.el3.src", "3ES:seamonkey-0:1.0.9-0.48.el3.x86_64", "3ES:seamonkey-chat-0:1.0.9-0.48.el3.i386", "3ES:seamonkey-chat-0:1.0.9-0.48.el3.ia64", "3ES:seamonkey-chat-0:1.0.9-0.48.el3.ppc", "3ES:seamonkey-chat-0:1.0.9-0.48.el3.s390", "3ES:seamonkey-chat-0:1.0.9-0.48.el3.s390x", "3ES:seamonkey-chat-0:1.0.9-0.48.el3.x86_64", "3ES:seamonkey-debuginfo-0:1.0.9-0.48.el3.i386", "3ES:seamonkey-debuginfo-0:1.0.9-0.48.el3.ia64", "3ES:seamonkey-debuginfo-0:1.0.9-0.48.el3.ppc", "3ES:seamonkey-debuginfo-0:1.0.9-0.48.el3.s390", "3ES:seamonkey-debuginfo-0:1.0.9-0.48.el3.s390x", "3ES:seamonkey-debuginfo-0:1.0.9-0.48.el3.x86_64", "3ES:seamonkey-devel-0:1.0.9-0.48.el3.i386", "3ES:seamonkey-devel-0:1.0.9-0.48.el3.ia64", "3ES:seamonkey-devel-0:1.0.9-0.48.el3.ppc", "3ES:seamonkey-devel-0:1.0.9-0.48.el3.s390", "3ES:seamonkey-devel-0:1.0.9-0.48.el3.s390x", "3ES:seamonkey-devel-0:1.0.9-0.48.el3.x86_64", "3ES:seamonkey-dom-inspector-0:1.0.9-0.48.el3.i386", "3ES:seamonkey-dom-inspector-0:1.0.9-0.48.el3.ia64", "3ES:seamonkey-dom-inspector-0:1.0.9-0.48.el3.ppc", "3ES:seamonkey-dom-inspector-0:1.0.9-0.48.el3.s390", "3ES:seamonkey-dom-inspector-0:1.0.9-0.48.el3.s390x", "3ES:seamonkey-dom-inspector-0:1.0.9-0.48.el3.x86_64", "3ES:seamonkey-js-debugger-0:1.0.9-0.48.el3.i386", "3ES:seamonkey-js-debugger-0:1.0.9-0.48.el3.ia64", "3ES:seamonkey-js-debugger-0:1.0.9-0.48.el3.ppc", "3ES:seamonkey-js-debugger-0:1.0.9-0.48.el3.s390", "3ES:seamonkey-js-debugger-0:1.0.9-0.48.el3.s390x", "3ES:seamonkey-js-debugger-0:1.0.9-0.48.el3.x86_64", "3ES:seamonkey-mail-0:1.0.9-0.48.el3.i386", "3ES:seamonkey-mail-0:1.0.9-0.48.el3.ia64", "3ES:seamonkey-mail-0:1.0.9-0.48.el3.ppc", "3ES:seamonkey-mail-0:1.0.9-0.48.el3.s390", "3ES:seamonkey-mail-0:1.0.9-0.48.el3.s390x", "3ES:seamonkey-mail-0:1.0.9-0.48.el3.x86_64", "3ES:seamonkey-nspr-0:1.0.9-0.48.el3.i386", "3ES:seamonkey-nspr-0:1.0.9-0.48.el3.ia64", "3ES:seamonkey-nspr-0:1.0.9-0.48.el3.ppc", "3ES:seamonkey-nspr-0:1.0.9-0.48.el3.s390", "3ES:seamonkey-nspr-0:1.0.9-0.48.el3.s390x", "3ES:seamonkey-nspr-0:1.0.9-0.48.el3.x86_64", "3ES:seamonkey-nspr-devel-0:1.0.9-0.48.el3.i386", "3ES:seamonkey-nspr-devel-0:1.0.9-0.48.el3.ia64", "3ES:seamonkey-nspr-devel-0:1.0.9-0.48.el3.ppc", "3ES:seamonkey-nspr-devel-0:1.0.9-0.48.el3.s390", "3ES:seamonkey-nspr-devel-0:1.0.9-0.48.el3.s390x", "3ES:seamonkey-nspr-devel-0:1.0.9-0.48.el3.x86_64", "3ES:seamonkey-nss-0:1.0.9-0.48.el3.i386", "3ES:seamonkey-nss-0:1.0.9-0.48.el3.ia64", "3ES:seamonkey-nss-0:1.0.9-0.48.el3.ppc", "3ES:seamonkey-nss-0:1.0.9-0.48.el3.s390", "3ES:seamonkey-nss-0:1.0.9-0.48.el3.s390x", "3ES:seamonkey-nss-0:1.0.9-0.48.el3.x86_64", "3ES:seamonkey-nss-devel-0:1.0.9-0.48.el3.i386", "3ES:seamonkey-nss-devel-0:1.0.9-0.48.el3.ia64", "3ES:seamonkey-nss-devel-0:1.0.9-0.48.el3.ppc", "3ES:seamonkey-nss-devel-0:1.0.9-0.48.el3.s390", "3ES:seamonkey-nss-devel-0:1.0.9-0.48.el3.s390x", "3ES:seamonkey-nss-devel-0:1.0.9-0.48.el3.x86_64", "3WS:seamonkey-0:1.0.9-0.48.el3.i386", "3WS:seamonkey-0:1.0.9-0.48.el3.ia64", "3WS:seamonkey-0:1.0.9-0.48.el3.ppc", "3WS:seamonkey-0:1.0.9-0.48.el3.s390", "3WS:seamonkey-0:1.0.9-0.48.el3.s390x", "3WS:seamonkey-0:1.0.9-0.48.el3.src", "3WS:seamonkey-0:1.0.9-0.48.el3.x86_64", "3WS:seamonkey-chat-0:1.0.9-0.48.el3.i386", "3WS:seamonkey-chat-0:1.0.9-0.48.el3.ia64", "3WS:seamonkey-chat-0:1.0.9-0.48.el3.ppc", "3WS:seamonkey-chat-0:1.0.9-0.48.el3.s390", "3WS:seamonkey-chat-0:1.0.9-0.48.el3.s390x", "3WS:seamonkey-chat-0:1.0.9-0.48.el3.x86_64", "3WS:seamonkey-debuginfo-0:1.0.9-0.48.el3.i386", "3WS:seamonkey-debuginfo-0:1.0.9-0.48.el3.ia64", "3WS:seamonkey-debuginfo-0:1.0.9-0.48.el3.ppc", "3WS:seamonkey-debuginfo-0:1.0.9-0.48.el3.s390", "3WS:seamonkey-debuginfo-0:1.0.9-0.48.el3.s390x", "3WS:seamonkey-debuginfo-0:1.0.9-0.48.el3.x86_64", "3WS:seamonkey-devel-0:1.0.9-0.48.el3.i386", "3WS:seamonkey-devel-0:1.0.9-0.48.el3.ia64", "3WS:seamonkey-devel-0:1.0.9-0.48.el3.ppc", "3WS:seamonkey-devel-0:1.0.9-0.48.el3.s390", "3WS:seamonkey-devel-0:1.0.9-0.48.el3.s390x", "3WS:seamonkey-devel-0:1.0.9-0.48.el3.x86_64", "3WS:seamonkey-dom-inspector-0:1.0.9-0.48.el3.i386", "3WS:seamonkey-dom-inspector-0:1.0.9-0.48.el3.ia64", "3WS:seamonkey-dom-inspector-0:1.0.9-0.48.el3.ppc", "3WS:seamonkey-dom-inspector-0:1.0.9-0.48.el3.s390", "3WS:seamonkey-dom-inspector-0:1.0.9-0.48.el3.s390x", "3WS:seamonkey-dom-inspector-0:1.0.9-0.48.el3.x86_64", "3WS:seamonkey-js-debugger-0:1.0.9-0.48.el3.i386", "3WS:seamonkey-js-debugger-0:1.0.9-0.48.el3.ia64", "3WS:seamonkey-js-debugger-0:1.0.9-0.48.el3.ppc", "3WS:seamonkey-js-debugger-0:1.0.9-0.48.el3.s390", "3WS:seamonkey-js-debugger-0:1.0.9-0.48.el3.s390x", "3WS:seamonkey-js-debugger-0:1.0.9-0.48.el3.x86_64", "3WS:seamonkey-mail-0:1.0.9-0.48.el3.i386", "3WS:seamonkey-mail-0:1.0.9-0.48.el3.ia64", "3WS:seamonkey-mail-0:1.0.9-0.48.el3.ppc", "3WS:seamonkey-mail-0:1.0.9-0.48.el3.s390", "3WS:seamonkey-mail-0:1.0.9-0.48.el3.s390x", "3WS:seamonkey-mail-0:1.0.9-0.48.el3.x86_64", "3WS:seamonkey-nspr-0:1.0.9-0.48.el3.i386", "3WS:seamonkey-nspr-0:1.0.9-0.48.el3.ia64", "3WS:seamonkey-nspr-0:1.0.9-0.48.el3.ppc", "3WS:seamonkey-nspr-0:1.0.9-0.48.el3.s390", "3WS:seamonkey-nspr-0:1.0.9-0.48.el3.s390x", "3WS:seamonkey-nspr-0:1.0.9-0.48.el3.x86_64", "3WS:seamonkey-nspr-devel-0:1.0.9-0.48.el3.i386", "3WS:seamonkey-nspr-devel-0:1.0.9-0.48.el3.ia64", "3WS:seamonkey-nspr-devel-0:1.0.9-0.48.el3.ppc", "3WS:seamonkey-nspr-devel-0:1.0.9-0.48.el3.s390", "3WS:seamonkey-nspr-devel-0:1.0.9-0.48.el3.s390x", "3WS:seamonkey-nspr-devel-0:1.0.9-0.48.el3.x86_64", "3WS:seamonkey-nss-0:1.0.9-0.48.el3.i386", "3WS:seamonkey-nss-0:1.0.9-0.48.el3.ia64", "3WS:seamonkey-nss-0:1.0.9-0.48.el3.ppc", "3WS:seamonkey-nss-0:1.0.9-0.48.el3.s390", "3WS:seamonkey-nss-0:1.0.9-0.48.el3.s390x", "3WS:seamonkey-nss-0:1.0.9-0.48.el3.x86_64", "3WS:seamonkey-nss-devel-0:1.0.9-0.48.el3.i386", "3WS:seamonkey-nss-devel-0:1.0.9-0.48.el3.ia64", "3WS:seamonkey-nss-devel-0:1.0.9-0.48.el3.ppc", "3WS:seamonkey-nss-devel-0:1.0.9-0.48.el3.s390", "3WS:seamonkey-nss-devel-0:1.0.9-0.48.el3.s390x", "3WS:seamonkey-nss-devel-0:1.0.9-0.48.el3.x86_64", "4AS:seamonkey-0:1.0.9-51.el4_8.i386", "4AS:seamonkey-0:1.0.9-51.el4_8.ia64", "4AS:seamonkey-0:1.0.9-51.el4_8.ppc", "4AS:seamonkey-0:1.0.9-51.el4_8.s390", "4AS:seamonkey-0:1.0.9-51.el4_8.s390x", "4AS:seamonkey-0:1.0.9-51.el4_8.src", "4AS:seamonkey-0:1.0.9-51.el4_8.x86_64", "4AS:seamonkey-chat-0:1.0.9-51.el4_8.i386", "4AS:seamonkey-chat-0:1.0.9-51.el4_8.ia64", "4AS:seamonkey-chat-0:1.0.9-51.el4_8.ppc", "4AS:seamonkey-chat-0:1.0.9-51.el4_8.s390", "4AS:seamonkey-chat-0:1.0.9-51.el4_8.s390x", "4AS:seamonkey-chat-0:1.0.9-51.el4_8.x86_64", "4AS:seamonkey-debuginfo-0:1.0.9-51.el4_8.i386", "4AS:seamonkey-debuginfo-0:1.0.9-51.el4_8.ia64", "4AS:seamonkey-debuginfo-0:1.0.9-51.el4_8.ppc", "4AS:seamonkey-debuginfo-0:1.0.9-51.el4_8.s390", "4AS:seamonkey-debuginfo-0:1.0.9-51.el4_8.s390x", "4AS:seamonkey-debuginfo-0:1.0.9-51.el4_8.x86_64", "4AS:seamonkey-devel-0:1.0.9-51.el4_8.i386", "4AS:seamonkey-devel-0:1.0.9-51.el4_8.ia64", "4AS:seamonkey-devel-0:1.0.9-51.el4_8.ppc", "4AS:seamonkey-devel-0:1.0.9-51.el4_8.s390", "4AS:seamonkey-devel-0:1.0.9-51.el4_8.s390x", "4AS:seamonkey-devel-0:1.0.9-51.el4_8.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.9-51.el4_8.i386", "4AS:seamonkey-dom-inspector-0:1.0.9-51.el4_8.ia64", "4AS:seamonkey-dom-inspector-0:1.0.9-51.el4_8.ppc", "4AS:seamonkey-dom-inspector-0:1.0.9-51.el4_8.s390", "4AS:seamonkey-dom-inspector-0:1.0.9-51.el4_8.s390x", "4AS:seamonkey-dom-inspector-0:1.0.9-51.el4_8.x86_64", "4AS:seamonkey-js-debugger-0:1.0.9-51.el4_8.i386", "4AS:seamonkey-js-debugger-0:1.0.9-51.el4_8.ia64", "4AS:seamonkey-js-debugger-0:1.0.9-51.el4_8.ppc", "4AS:seamonkey-js-debugger-0:1.0.9-51.el4_8.s390", "4AS:seamonkey-js-debugger-0:1.0.9-51.el4_8.s390x", "4AS:seamonkey-js-debugger-0:1.0.9-51.el4_8.x86_64", "4AS:seamonkey-mail-0:1.0.9-51.el4_8.i386", "4AS:seamonkey-mail-0:1.0.9-51.el4_8.ia64", "4AS:seamonkey-mail-0:1.0.9-51.el4_8.ppc", "4AS:seamonkey-mail-0:1.0.9-51.el4_8.s390", "4AS:seamonkey-mail-0:1.0.9-51.el4_8.s390x", "4AS:seamonkey-mail-0:1.0.9-51.el4_8.x86_64", "4Desktop:seamonkey-0:1.0.9-51.el4_8.i386", "4Desktop:seamonkey-0:1.0.9-51.el4_8.ia64", "4Desktop:seamonkey-0:1.0.9-51.el4_8.ppc", "4Desktop:seamonkey-0:1.0.9-51.el4_8.s390", "4Desktop:seamonkey-0:1.0.9-51.el4_8.s390x", "4Desktop:seamonkey-0:1.0.9-51.el4_8.src", "4Desktop:seamonkey-0:1.0.9-51.el4_8.x86_64", "4Desktop:seamonkey-chat-0:1.0.9-51.el4_8.i386", "4Desktop:seamonkey-chat-0:1.0.9-51.el4_8.ia64", "4Desktop:seamonkey-chat-0:1.0.9-51.el4_8.ppc", "4Desktop:seamonkey-chat-0:1.0.9-51.el4_8.s390", "4Desktop:seamonkey-chat-0:1.0.9-51.el4_8.s390x", "4Desktop:seamonkey-chat-0:1.0.9-51.el4_8.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.9-51.el4_8.i386", "4Desktop:seamonkey-debuginfo-0:1.0.9-51.el4_8.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.9-51.el4_8.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.9-51.el4_8.s390", "4Desktop:seamonkey-debuginfo-0:1.0.9-51.el4_8.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.9-51.el4_8.x86_64", "4Desktop:seamonkey-devel-0:1.0.9-51.el4_8.i386", "4Desktop:seamonkey-devel-0:1.0.9-51.el4_8.ia64", "4Desktop:seamonkey-devel-0:1.0.9-51.el4_8.ppc", "4Desktop:seamonkey-devel-0:1.0.9-51.el4_8.s390", "4Desktop:seamonkey-devel-0:1.0.9-51.el4_8.s390x", "4Desktop:seamonkey-devel-0:1.0.9-51.el4_8.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.9-51.el4_8.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.9-51.el4_8.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.9-51.el4_8.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.9-51.el4_8.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.9-51.el4_8.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.9-51.el4_8.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.9-51.el4_8.i386", "4Desktop:seamonkey-js-debugger-0:1.0.9-51.el4_8.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.9-51.el4_8.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.9-51.el4_8.s390", "4Desktop:seamonkey-js-debugger-0:1.0.9-51.el4_8.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.9-51.el4_8.x86_64", "4Desktop:seamonkey-mail-0:1.0.9-51.el4_8.i386", "4Desktop:seamonkey-mail-0:1.0.9-51.el4_8.ia64", "4Desktop:seamonkey-mail-0:1.0.9-51.el4_8.ppc", "4Desktop:seamonkey-mail-0:1.0.9-51.el4_8.s390", "4Desktop:seamonkey-mail-0:1.0.9-51.el4_8.s390x", "4Desktop:seamonkey-mail-0:1.0.9-51.el4_8.x86_64", "4ES:seamonkey-0:1.0.9-51.el4_8.i386", "4ES:seamonkey-0:1.0.9-51.el4_8.ia64", "4ES:seamonkey-0:1.0.9-51.el4_8.ppc", "4ES:seamonkey-0:1.0.9-51.el4_8.s390", "4ES:seamonkey-0:1.0.9-51.el4_8.s390x", "4ES:seamonkey-0:1.0.9-51.el4_8.src", "4ES:seamonkey-0:1.0.9-51.el4_8.x86_64", "4ES:seamonkey-chat-0:1.0.9-51.el4_8.i386", "4ES:seamonkey-chat-0:1.0.9-51.el4_8.ia64", "4ES:seamonkey-chat-0:1.0.9-51.el4_8.ppc", "4ES:seamonkey-chat-0:1.0.9-51.el4_8.s390", "4ES:seamonkey-chat-0:1.0.9-51.el4_8.s390x", "4ES:seamonkey-chat-0:1.0.9-51.el4_8.x86_64", "4ES:seamonkey-debuginfo-0:1.0.9-51.el4_8.i386", "4ES:seamonkey-debuginfo-0:1.0.9-51.el4_8.ia64", "4ES:seamonkey-debuginfo-0:1.0.9-51.el4_8.ppc", "4ES:seamonkey-debuginfo-0:1.0.9-51.el4_8.s390", "4ES:seamonkey-debuginfo-0:1.0.9-51.el4_8.s390x", "4ES:seamonkey-debuginfo-0:1.0.9-51.el4_8.x86_64", "4ES:seamonkey-devel-0:1.0.9-51.el4_8.i386", "4ES:seamonkey-devel-0:1.0.9-51.el4_8.ia64", "4ES:seamonkey-devel-0:1.0.9-51.el4_8.ppc", "4ES:seamonkey-devel-0:1.0.9-51.el4_8.s390", "4ES:seamonkey-devel-0:1.0.9-51.el4_8.s390x", "4ES:seamonkey-devel-0:1.0.9-51.el4_8.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.9-51.el4_8.i386", "4ES:seamonkey-dom-inspector-0:1.0.9-51.el4_8.ia64", "4ES:seamonkey-dom-inspector-0:1.0.9-51.el4_8.ppc", "4ES:seamonkey-dom-inspector-0:1.0.9-51.el4_8.s390", "4ES:seamonkey-dom-inspector-0:1.0.9-51.el4_8.s390x", "4ES:seamonkey-dom-inspector-0:1.0.9-51.el4_8.x86_64", "4ES:seamonkey-js-debugger-0:1.0.9-51.el4_8.i386", "4ES:seamonkey-js-debugger-0:1.0.9-51.el4_8.ia64", "4ES:seamonkey-js-debugger-0:1.0.9-51.el4_8.ppc", "4ES:seamonkey-js-debugger-0:1.0.9-51.el4_8.s390", "4ES:seamonkey-js-debugger-0:1.0.9-51.el4_8.s390x", "4ES:seamonkey-js-debugger-0:1.0.9-51.el4_8.x86_64", "4ES:seamonkey-mail-0:1.0.9-51.el4_8.i386", "4ES:seamonkey-mail-0:1.0.9-51.el4_8.ia64", "4ES:seamonkey-mail-0:1.0.9-51.el4_8.ppc", "4ES:seamonkey-mail-0:1.0.9-51.el4_8.s390", "4ES:seamonkey-mail-0:1.0.9-51.el4_8.s390x", "4ES:seamonkey-mail-0:1.0.9-51.el4_8.x86_64", "4WS:seamonkey-0:1.0.9-51.el4_8.i386", "4WS:seamonkey-0:1.0.9-51.el4_8.ia64", "4WS:seamonkey-0:1.0.9-51.el4_8.ppc", "4WS:seamonkey-0:1.0.9-51.el4_8.s390", "4WS:seamonkey-0:1.0.9-51.el4_8.s390x", "4WS:seamonkey-0:1.0.9-51.el4_8.src", "4WS:seamonkey-0:1.0.9-51.el4_8.x86_64", "4WS:seamonkey-chat-0:1.0.9-51.el4_8.i386", "4WS:seamonkey-chat-0:1.0.9-51.el4_8.ia64", "4WS:seamonkey-chat-0:1.0.9-51.el4_8.ppc", "4WS:seamonkey-chat-0:1.0.9-51.el4_8.s390", "4WS:seamonkey-chat-0:1.0.9-51.el4_8.s390x", "4WS:seamonkey-chat-0:1.0.9-51.el4_8.x86_64", "4WS:seamonkey-debuginfo-0:1.0.9-51.el4_8.i386", "4WS:seamonkey-debuginfo-0:1.0.9-51.el4_8.ia64", "4WS:seamonkey-debuginfo-0:1.0.9-51.el4_8.ppc", "4WS:seamonkey-debuginfo-0:1.0.9-51.el4_8.s390", "4WS:seamonkey-debuginfo-0:1.0.9-51.el4_8.s390x", "4WS:seamonkey-debuginfo-0:1.0.9-51.el4_8.x86_64", "4WS:seamonkey-devel-0:1.0.9-51.el4_8.i386", "4WS:seamonkey-devel-0:1.0.9-51.el4_8.ia64", "4WS:seamonkey-devel-0:1.0.9-51.el4_8.ppc", "4WS:seamonkey-devel-0:1.0.9-51.el4_8.s390", "4WS:seamonkey-devel-0:1.0.9-51.el4_8.s390x", "4WS:seamonkey-devel-0:1.0.9-51.el4_8.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.9-51.el4_8.i386", "4WS:seamonkey-dom-inspector-0:1.0.9-51.el4_8.ia64", "4WS:seamonkey-dom-inspector-0:1.0.9-51.el4_8.ppc", "4WS:seamonkey-dom-inspector-0:1.0.9-51.el4_8.s390", "4WS:seamonkey-dom-inspector-0:1.0.9-51.el4_8.s390x", "4WS:seamonkey-dom-inspector-0:1.0.9-51.el4_8.x86_64", "4WS:seamonkey-js-debugger-0:1.0.9-51.el4_8.i386", "4WS:seamonkey-js-debugger-0:1.0.9-51.el4_8.ia64", "4WS:seamonkey-js-debugger-0:1.0.9-51.el4_8.ppc", "4WS:seamonkey-js-debugger-0:1.0.9-51.el4_8.s390", "4WS:seamonkey-js-debugger-0:1.0.9-51.el4_8.s390x", "4WS:seamonkey-js-debugger-0:1.0.9-51.el4_8.x86_64", "4WS:seamonkey-mail-0:1.0.9-51.el4_8.i386", "4WS:seamonkey-mail-0:1.0.9-51.el4_8.ia64", "4WS:seamonkey-mail-0:1.0.9-51.el4_8.ppc", "4WS:seamonkey-mail-0:1.0.9-51.el4_8.s390", "4WS:seamonkey-mail-0:1.0.9-51.el4_8.s390x", "4WS:seamonkey-mail-0:1.0.9-51.el4_8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-3979" }, { "category": "external", "summary": "RHBZ#546694", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=546694" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3979", "url": "https://www.cve.org/CVERecord?id=CVE-2009-3979" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3979", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3979" } ], "release_date": "2009-12-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-12-16T04:33:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "3AS:seamonkey-0:1.0.9-0.48.el3.i386", "3AS:seamonkey-0:1.0.9-0.48.el3.ia64", "3AS:seamonkey-0:1.0.9-0.48.el3.ppc", "3AS:seamonkey-0:1.0.9-0.48.el3.s390", "3AS:seamonkey-0:1.0.9-0.48.el3.s390x", "3AS:seamonkey-0:1.0.9-0.48.el3.src", "3AS:seamonkey-0:1.0.9-0.48.el3.x86_64", "3AS:seamonkey-chat-0:1.0.9-0.48.el3.i386", "3AS:seamonkey-chat-0:1.0.9-0.48.el3.ia64", "3AS:seamonkey-chat-0:1.0.9-0.48.el3.ppc", "3AS:seamonkey-chat-0:1.0.9-0.48.el3.s390", "3AS:seamonkey-chat-0:1.0.9-0.48.el3.s390x", "3AS:seamonkey-chat-0:1.0.9-0.48.el3.x86_64", "3AS:seamonkey-debuginfo-0:1.0.9-0.48.el3.i386", "3AS:seamonkey-debuginfo-0:1.0.9-0.48.el3.ia64", "3AS:seamonkey-debuginfo-0:1.0.9-0.48.el3.ppc", "3AS:seamonkey-debuginfo-0:1.0.9-0.48.el3.s390", "3AS:seamonkey-debuginfo-0:1.0.9-0.48.el3.s390x", "3AS:seamonkey-debuginfo-0:1.0.9-0.48.el3.x86_64", "3AS:seamonkey-devel-0:1.0.9-0.48.el3.i386", "3AS:seamonkey-devel-0:1.0.9-0.48.el3.ia64", "3AS:seamonkey-devel-0:1.0.9-0.48.el3.ppc", "3AS:seamonkey-devel-0:1.0.9-0.48.el3.s390", "3AS:seamonkey-devel-0:1.0.9-0.48.el3.s390x", "3AS:seamonkey-devel-0:1.0.9-0.48.el3.x86_64", "3AS:seamonkey-dom-inspector-0:1.0.9-0.48.el3.i386", "3AS:seamonkey-dom-inspector-0:1.0.9-0.48.el3.ia64", "3AS:seamonkey-dom-inspector-0:1.0.9-0.48.el3.ppc", "3AS:seamonkey-dom-inspector-0:1.0.9-0.48.el3.s390", "3AS:seamonkey-dom-inspector-0:1.0.9-0.48.el3.s390x", "3AS:seamonkey-dom-inspector-0:1.0.9-0.48.el3.x86_64", "3AS:seamonkey-js-debugger-0:1.0.9-0.48.el3.i386", "3AS:seamonkey-js-debugger-0:1.0.9-0.48.el3.ia64", "3AS:seamonkey-js-debugger-0:1.0.9-0.48.el3.ppc", "3AS:seamonkey-js-debugger-0:1.0.9-0.48.el3.s390", "3AS:seamonkey-js-debugger-0:1.0.9-0.48.el3.s390x", "3AS:seamonkey-js-debugger-0:1.0.9-0.48.el3.x86_64", "3AS:seamonkey-mail-0:1.0.9-0.48.el3.i386", "3AS:seamonkey-mail-0:1.0.9-0.48.el3.ia64", "3AS:seamonkey-mail-0:1.0.9-0.48.el3.ppc", "3AS:seamonkey-mail-0:1.0.9-0.48.el3.s390", "3AS:seamonkey-mail-0:1.0.9-0.48.el3.s390x", "3AS:seamonkey-mail-0:1.0.9-0.48.el3.x86_64", "3AS:seamonkey-nspr-0:1.0.9-0.48.el3.i386", "3AS:seamonkey-nspr-0:1.0.9-0.48.el3.ia64", "3AS:seamonkey-nspr-0:1.0.9-0.48.el3.ppc", "3AS:seamonkey-nspr-0:1.0.9-0.48.el3.s390", "3AS:seamonkey-nspr-0:1.0.9-0.48.el3.s390x", "3AS:seamonkey-nspr-0:1.0.9-0.48.el3.x86_64", "3AS:seamonkey-nspr-devel-0:1.0.9-0.48.el3.i386", "3AS:seamonkey-nspr-devel-0:1.0.9-0.48.el3.ia64", "3AS:seamonkey-nspr-devel-0:1.0.9-0.48.el3.ppc", "3AS:seamonkey-nspr-devel-0:1.0.9-0.48.el3.s390", "3AS:seamonkey-nspr-devel-0:1.0.9-0.48.el3.s390x", "3AS:seamonkey-nspr-devel-0:1.0.9-0.48.el3.x86_64", "3AS:seamonkey-nss-0:1.0.9-0.48.el3.i386", "3AS:seamonkey-nss-0:1.0.9-0.48.el3.ia64", "3AS:seamonkey-nss-0:1.0.9-0.48.el3.ppc", "3AS:seamonkey-nss-0:1.0.9-0.48.el3.s390", "3AS:seamonkey-nss-0:1.0.9-0.48.el3.s390x", "3AS:seamonkey-nss-0:1.0.9-0.48.el3.x86_64", "3AS:seamonkey-nss-devel-0:1.0.9-0.48.el3.i386", "3AS:seamonkey-nss-devel-0:1.0.9-0.48.el3.ia64", "3AS:seamonkey-nss-devel-0:1.0.9-0.48.el3.ppc", "3AS:seamonkey-nss-devel-0:1.0.9-0.48.el3.s390", "3AS:seamonkey-nss-devel-0:1.0.9-0.48.el3.s390x", "3AS:seamonkey-nss-devel-0:1.0.9-0.48.el3.x86_64", "3Desktop:seamonkey-0:1.0.9-0.48.el3.i386", "3Desktop:seamonkey-0:1.0.9-0.48.el3.ia64", "3Desktop:seamonkey-0:1.0.9-0.48.el3.ppc", "3Desktop:seamonkey-0:1.0.9-0.48.el3.s390", "3Desktop:seamonkey-0:1.0.9-0.48.el3.s390x", "3Desktop:seamonkey-0:1.0.9-0.48.el3.src", "3Desktop:seamonkey-0:1.0.9-0.48.el3.x86_64", "3Desktop:seamonkey-chat-0:1.0.9-0.48.el3.i386", "3Desktop:seamonkey-chat-0:1.0.9-0.48.el3.ia64", "3Desktop:seamonkey-chat-0:1.0.9-0.48.el3.ppc", "3Desktop:seamonkey-chat-0:1.0.9-0.48.el3.s390", "3Desktop:seamonkey-chat-0:1.0.9-0.48.el3.s390x", "3Desktop:seamonkey-chat-0:1.0.9-0.48.el3.x86_64", "3Desktop:seamonkey-debuginfo-0:1.0.9-0.48.el3.i386", "3Desktop:seamonkey-debuginfo-0:1.0.9-0.48.el3.ia64", "3Desktop:seamonkey-debuginfo-0:1.0.9-0.48.el3.ppc", "3Desktop:seamonkey-debuginfo-0:1.0.9-0.48.el3.s390", "3Desktop:seamonkey-debuginfo-0:1.0.9-0.48.el3.s390x", "3Desktop:seamonkey-debuginfo-0:1.0.9-0.48.el3.x86_64", "3Desktop:seamonkey-devel-0:1.0.9-0.48.el3.i386", "3Desktop:seamonkey-devel-0:1.0.9-0.48.el3.ia64", "3Desktop:seamonkey-devel-0:1.0.9-0.48.el3.ppc", "3Desktop:seamonkey-devel-0:1.0.9-0.48.el3.s390", "3Desktop:seamonkey-devel-0:1.0.9-0.48.el3.s390x", "3Desktop:seamonkey-devel-0:1.0.9-0.48.el3.x86_64", "3Desktop:seamonkey-dom-inspector-0:1.0.9-0.48.el3.i386", "3Desktop:seamonkey-dom-inspector-0:1.0.9-0.48.el3.ia64", "3Desktop:seamonkey-dom-inspector-0:1.0.9-0.48.el3.ppc", "3Desktop:seamonkey-dom-inspector-0:1.0.9-0.48.el3.s390", "3Desktop:seamonkey-dom-inspector-0:1.0.9-0.48.el3.s390x", "3Desktop:seamonkey-dom-inspector-0:1.0.9-0.48.el3.x86_64", "3Desktop:seamonkey-js-debugger-0:1.0.9-0.48.el3.i386", "3Desktop:seamonkey-js-debugger-0:1.0.9-0.48.el3.ia64", "3Desktop:seamonkey-js-debugger-0:1.0.9-0.48.el3.ppc", "3Desktop:seamonkey-js-debugger-0:1.0.9-0.48.el3.s390", "3Desktop:seamonkey-js-debugger-0:1.0.9-0.48.el3.s390x", "3Desktop:seamonkey-js-debugger-0:1.0.9-0.48.el3.x86_64", "3Desktop:seamonkey-mail-0:1.0.9-0.48.el3.i386", "3Desktop:seamonkey-mail-0:1.0.9-0.48.el3.ia64", "3Desktop:seamonkey-mail-0:1.0.9-0.48.el3.ppc", "3Desktop:seamonkey-mail-0:1.0.9-0.48.el3.s390", "3Desktop:seamonkey-mail-0:1.0.9-0.48.el3.s390x", "3Desktop:seamonkey-mail-0:1.0.9-0.48.el3.x86_64", "3Desktop:seamonkey-nspr-0:1.0.9-0.48.el3.i386", "3Desktop:seamonkey-nspr-0:1.0.9-0.48.el3.ia64", "3Desktop:seamonkey-nspr-0:1.0.9-0.48.el3.ppc", "3Desktop:seamonkey-nspr-0:1.0.9-0.48.el3.s390", "3Desktop:seamonkey-nspr-0:1.0.9-0.48.el3.s390x", "3Desktop:seamonkey-nspr-0:1.0.9-0.48.el3.x86_64", "3Desktop:seamonkey-nspr-devel-0:1.0.9-0.48.el3.i386", "3Desktop:seamonkey-nspr-devel-0:1.0.9-0.48.el3.ia64", "3Desktop:seamonkey-nspr-devel-0:1.0.9-0.48.el3.ppc", "3Desktop:seamonkey-nspr-devel-0:1.0.9-0.48.el3.s390", "3Desktop:seamonkey-nspr-devel-0:1.0.9-0.48.el3.s390x", "3Desktop:seamonkey-nspr-devel-0:1.0.9-0.48.el3.x86_64", "3Desktop:seamonkey-nss-0:1.0.9-0.48.el3.i386", "3Desktop:seamonkey-nss-0:1.0.9-0.48.el3.ia64", "3Desktop:seamonkey-nss-0:1.0.9-0.48.el3.ppc", "3Desktop:seamonkey-nss-0:1.0.9-0.48.el3.s390", "3Desktop:seamonkey-nss-0:1.0.9-0.48.el3.s390x", "3Desktop:seamonkey-nss-0:1.0.9-0.48.el3.x86_64", "3Desktop:seamonkey-nss-devel-0:1.0.9-0.48.el3.i386", "3Desktop:seamonkey-nss-devel-0:1.0.9-0.48.el3.ia64", "3Desktop:seamonkey-nss-devel-0:1.0.9-0.48.el3.ppc", "3Desktop:seamonkey-nss-devel-0:1.0.9-0.48.el3.s390", "3Desktop:seamonkey-nss-devel-0:1.0.9-0.48.el3.s390x", "3Desktop:seamonkey-nss-devel-0:1.0.9-0.48.el3.x86_64", "3ES:seamonkey-0:1.0.9-0.48.el3.i386", "3ES:seamonkey-0:1.0.9-0.48.el3.ia64", "3ES:seamonkey-0:1.0.9-0.48.el3.ppc", "3ES:seamonkey-0:1.0.9-0.48.el3.s390", "3ES:seamonkey-0:1.0.9-0.48.el3.s390x", "3ES:seamonkey-0:1.0.9-0.48.el3.src", "3ES:seamonkey-0:1.0.9-0.48.el3.x86_64", "3ES:seamonkey-chat-0:1.0.9-0.48.el3.i386", "3ES:seamonkey-chat-0:1.0.9-0.48.el3.ia64", "3ES:seamonkey-chat-0:1.0.9-0.48.el3.ppc", "3ES:seamonkey-chat-0:1.0.9-0.48.el3.s390", "3ES:seamonkey-chat-0:1.0.9-0.48.el3.s390x", "3ES:seamonkey-chat-0:1.0.9-0.48.el3.x86_64", "3ES:seamonkey-debuginfo-0:1.0.9-0.48.el3.i386", "3ES:seamonkey-debuginfo-0:1.0.9-0.48.el3.ia64", "3ES:seamonkey-debuginfo-0:1.0.9-0.48.el3.ppc", "3ES:seamonkey-debuginfo-0:1.0.9-0.48.el3.s390", "3ES:seamonkey-debuginfo-0:1.0.9-0.48.el3.s390x", "3ES:seamonkey-debuginfo-0:1.0.9-0.48.el3.x86_64", "3ES:seamonkey-devel-0:1.0.9-0.48.el3.i386", "3ES:seamonkey-devel-0:1.0.9-0.48.el3.ia64", "3ES:seamonkey-devel-0:1.0.9-0.48.el3.ppc", "3ES:seamonkey-devel-0:1.0.9-0.48.el3.s390", "3ES:seamonkey-devel-0:1.0.9-0.48.el3.s390x", "3ES:seamonkey-devel-0:1.0.9-0.48.el3.x86_64", "3ES:seamonkey-dom-inspector-0:1.0.9-0.48.el3.i386", "3ES:seamonkey-dom-inspector-0:1.0.9-0.48.el3.ia64", "3ES:seamonkey-dom-inspector-0:1.0.9-0.48.el3.ppc", "3ES:seamonkey-dom-inspector-0:1.0.9-0.48.el3.s390", "3ES:seamonkey-dom-inspector-0:1.0.9-0.48.el3.s390x", "3ES:seamonkey-dom-inspector-0:1.0.9-0.48.el3.x86_64", "3ES:seamonkey-js-debugger-0:1.0.9-0.48.el3.i386", "3ES:seamonkey-js-debugger-0:1.0.9-0.48.el3.ia64", "3ES:seamonkey-js-debugger-0:1.0.9-0.48.el3.ppc", "3ES:seamonkey-js-debugger-0:1.0.9-0.48.el3.s390", "3ES:seamonkey-js-debugger-0:1.0.9-0.48.el3.s390x", "3ES:seamonkey-js-debugger-0:1.0.9-0.48.el3.x86_64", "3ES:seamonkey-mail-0:1.0.9-0.48.el3.i386", "3ES:seamonkey-mail-0:1.0.9-0.48.el3.ia64", "3ES:seamonkey-mail-0:1.0.9-0.48.el3.ppc", "3ES:seamonkey-mail-0:1.0.9-0.48.el3.s390", "3ES:seamonkey-mail-0:1.0.9-0.48.el3.s390x", "3ES:seamonkey-mail-0:1.0.9-0.48.el3.x86_64", "3ES:seamonkey-nspr-0:1.0.9-0.48.el3.i386", "3ES:seamonkey-nspr-0:1.0.9-0.48.el3.ia64", "3ES:seamonkey-nspr-0:1.0.9-0.48.el3.ppc", "3ES:seamonkey-nspr-0:1.0.9-0.48.el3.s390", "3ES:seamonkey-nspr-0:1.0.9-0.48.el3.s390x", "3ES:seamonkey-nspr-0:1.0.9-0.48.el3.x86_64", "3ES:seamonkey-nspr-devel-0:1.0.9-0.48.el3.i386", "3ES:seamonkey-nspr-devel-0:1.0.9-0.48.el3.ia64", "3ES:seamonkey-nspr-devel-0:1.0.9-0.48.el3.ppc", "3ES:seamonkey-nspr-devel-0:1.0.9-0.48.el3.s390", "3ES:seamonkey-nspr-devel-0:1.0.9-0.48.el3.s390x", "3ES:seamonkey-nspr-devel-0:1.0.9-0.48.el3.x86_64", "3ES:seamonkey-nss-0:1.0.9-0.48.el3.i386", "3ES:seamonkey-nss-0:1.0.9-0.48.el3.ia64", "3ES:seamonkey-nss-0:1.0.9-0.48.el3.ppc", "3ES:seamonkey-nss-0:1.0.9-0.48.el3.s390", "3ES:seamonkey-nss-0:1.0.9-0.48.el3.s390x", "3ES:seamonkey-nss-0:1.0.9-0.48.el3.x86_64", "3ES:seamonkey-nss-devel-0:1.0.9-0.48.el3.i386", "3ES:seamonkey-nss-devel-0:1.0.9-0.48.el3.ia64", "3ES:seamonkey-nss-devel-0:1.0.9-0.48.el3.ppc", "3ES:seamonkey-nss-devel-0:1.0.9-0.48.el3.s390", "3ES:seamonkey-nss-devel-0:1.0.9-0.48.el3.s390x", "3ES:seamonkey-nss-devel-0:1.0.9-0.48.el3.x86_64", "3WS:seamonkey-0:1.0.9-0.48.el3.i386", "3WS:seamonkey-0:1.0.9-0.48.el3.ia64", "3WS:seamonkey-0:1.0.9-0.48.el3.ppc", "3WS:seamonkey-0:1.0.9-0.48.el3.s390", "3WS:seamonkey-0:1.0.9-0.48.el3.s390x", "3WS:seamonkey-0:1.0.9-0.48.el3.src", "3WS:seamonkey-0:1.0.9-0.48.el3.x86_64", "3WS:seamonkey-chat-0:1.0.9-0.48.el3.i386", "3WS:seamonkey-chat-0:1.0.9-0.48.el3.ia64", "3WS:seamonkey-chat-0:1.0.9-0.48.el3.ppc", "3WS:seamonkey-chat-0:1.0.9-0.48.el3.s390", "3WS:seamonkey-chat-0:1.0.9-0.48.el3.s390x", "3WS:seamonkey-chat-0:1.0.9-0.48.el3.x86_64", "3WS:seamonkey-debuginfo-0:1.0.9-0.48.el3.i386", "3WS:seamonkey-debuginfo-0:1.0.9-0.48.el3.ia64", "3WS:seamonkey-debuginfo-0:1.0.9-0.48.el3.ppc", "3WS:seamonkey-debuginfo-0:1.0.9-0.48.el3.s390", "3WS:seamonkey-debuginfo-0:1.0.9-0.48.el3.s390x", "3WS:seamonkey-debuginfo-0:1.0.9-0.48.el3.x86_64", "3WS:seamonkey-devel-0:1.0.9-0.48.el3.i386", "3WS:seamonkey-devel-0:1.0.9-0.48.el3.ia64", "3WS:seamonkey-devel-0:1.0.9-0.48.el3.ppc", "3WS:seamonkey-devel-0:1.0.9-0.48.el3.s390", "3WS:seamonkey-devel-0:1.0.9-0.48.el3.s390x", "3WS:seamonkey-devel-0:1.0.9-0.48.el3.x86_64", "3WS:seamonkey-dom-inspector-0:1.0.9-0.48.el3.i386", "3WS:seamonkey-dom-inspector-0:1.0.9-0.48.el3.ia64", "3WS:seamonkey-dom-inspector-0:1.0.9-0.48.el3.ppc", "3WS:seamonkey-dom-inspector-0:1.0.9-0.48.el3.s390", "3WS:seamonkey-dom-inspector-0:1.0.9-0.48.el3.s390x", "3WS:seamonkey-dom-inspector-0:1.0.9-0.48.el3.x86_64", "3WS:seamonkey-js-debugger-0:1.0.9-0.48.el3.i386", "3WS:seamonkey-js-debugger-0:1.0.9-0.48.el3.ia64", "3WS:seamonkey-js-debugger-0:1.0.9-0.48.el3.ppc", "3WS:seamonkey-js-debugger-0:1.0.9-0.48.el3.s390", "3WS:seamonkey-js-debugger-0:1.0.9-0.48.el3.s390x", "3WS:seamonkey-js-debugger-0:1.0.9-0.48.el3.x86_64", "3WS:seamonkey-mail-0:1.0.9-0.48.el3.i386", "3WS:seamonkey-mail-0:1.0.9-0.48.el3.ia64", "3WS:seamonkey-mail-0:1.0.9-0.48.el3.ppc", "3WS:seamonkey-mail-0:1.0.9-0.48.el3.s390", "3WS:seamonkey-mail-0:1.0.9-0.48.el3.s390x", "3WS:seamonkey-mail-0:1.0.9-0.48.el3.x86_64", "3WS:seamonkey-nspr-0:1.0.9-0.48.el3.i386", "3WS:seamonkey-nspr-0:1.0.9-0.48.el3.ia64", "3WS:seamonkey-nspr-0:1.0.9-0.48.el3.ppc", "3WS:seamonkey-nspr-0:1.0.9-0.48.el3.s390", "3WS:seamonkey-nspr-0:1.0.9-0.48.el3.s390x", "3WS:seamonkey-nspr-0:1.0.9-0.48.el3.x86_64", "3WS:seamonkey-nspr-devel-0:1.0.9-0.48.el3.i386", "3WS:seamonkey-nspr-devel-0:1.0.9-0.48.el3.ia64", "3WS:seamonkey-nspr-devel-0:1.0.9-0.48.el3.ppc", "3WS:seamonkey-nspr-devel-0:1.0.9-0.48.el3.s390", "3WS:seamonkey-nspr-devel-0:1.0.9-0.48.el3.s390x", "3WS:seamonkey-nspr-devel-0:1.0.9-0.48.el3.x86_64", "3WS:seamonkey-nss-0:1.0.9-0.48.el3.i386", "3WS:seamonkey-nss-0:1.0.9-0.48.el3.ia64", "3WS:seamonkey-nss-0:1.0.9-0.48.el3.ppc", "3WS:seamonkey-nss-0:1.0.9-0.48.el3.s390", "3WS:seamonkey-nss-0:1.0.9-0.48.el3.s390x", "3WS:seamonkey-nss-0:1.0.9-0.48.el3.x86_64", "3WS:seamonkey-nss-devel-0:1.0.9-0.48.el3.i386", "3WS:seamonkey-nss-devel-0:1.0.9-0.48.el3.ia64", "3WS:seamonkey-nss-devel-0:1.0.9-0.48.el3.ppc", "3WS:seamonkey-nss-devel-0:1.0.9-0.48.el3.s390", "3WS:seamonkey-nss-devel-0:1.0.9-0.48.el3.s390x", "3WS:seamonkey-nss-devel-0:1.0.9-0.48.el3.x86_64", "4AS:seamonkey-0:1.0.9-51.el4_8.i386", "4AS:seamonkey-0:1.0.9-51.el4_8.ia64", "4AS:seamonkey-0:1.0.9-51.el4_8.ppc", "4AS:seamonkey-0:1.0.9-51.el4_8.s390", "4AS:seamonkey-0:1.0.9-51.el4_8.s390x", "4AS:seamonkey-0:1.0.9-51.el4_8.src", "4AS:seamonkey-0:1.0.9-51.el4_8.x86_64", "4AS:seamonkey-chat-0:1.0.9-51.el4_8.i386", "4AS:seamonkey-chat-0:1.0.9-51.el4_8.ia64", "4AS:seamonkey-chat-0:1.0.9-51.el4_8.ppc", "4AS:seamonkey-chat-0:1.0.9-51.el4_8.s390", "4AS:seamonkey-chat-0:1.0.9-51.el4_8.s390x", "4AS:seamonkey-chat-0:1.0.9-51.el4_8.x86_64", "4AS:seamonkey-debuginfo-0:1.0.9-51.el4_8.i386", "4AS:seamonkey-debuginfo-0:1.0.9-51.el4_8.ia64", "4AS:seamonkey-debuginfo-0:1.0.9-51.el4_8.ppc", "4AS:seamonkey-debuginfo-0:1.0.9-51.el4_8.s390", "4AS:seamonkey-debuginfo-0:1.0.9-51.el4_8.s390x", "4AS:seamonkey-debuginfo-0:1.0.9-51.el4_8.x86_64", "4AS:seamonkey-devel-0:1.0.9-51.el4_8.i386", "4AS:seamonkey-devel-0:1.0.9-51.el4_8.ia64", "4AS:seamonkey-devel-0:1.0.9-51.el4_8.ppc", "4AS:seamonkey-devel-0:1.0.9-51.el4_8.s390", "4AS:seamonkey-devel-0:1.0.9-51.el4_8.s390x", "4AS:seamonkey-devel-0:1.0.9-51.el4_8.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.9-51.el4_8.i386", "4AS:seamonkey-dom-inspector-0:1.0.9-51.el4_8.ia64", "4AS:seamonkey-dom-inspector-0:1.0.9-51.el4_8.ppc", "4AS:seamonkey-dom-inspector-0:1.0.9-51.el4_8.s390", "4AS:seamonkey-dom-inspector-0:1.0.9-51.el4_8.s390x", "4AS:seamonkey-dom-inspector-0:1.0.9-51.el4_8.x86_64", "4AS:seamonkey-js-debugger-0:1.0.9-51.el4_8.i386", "4AS:seamonkey-js-debugger-0:1.0.9-51.el4_8.ia64", "4AS:seamonkey-js-debugger-0:1.0.9-51.el4_8.ppc", "4AS:seamonkey-js-debugger-0:1.0.9-51.el4_8.s390", "4AS:seamonkey-js-debugger-0:1.0.9-51.el4_8.s390x", "4AS:seamonkey-js-debugger-0:1.0.9-51.el4_8.x86_64", "4AS:seamonkey-mail-0:1.0.9-51.el4_8.i386", "4AS:seamonkey-mail-0:1.0.9-51.el4_8.ia64", "4AS:seamonkey-mail-0:1.0.9-51.el4_8.ppc", "4AS:seamonkey-mail-0:1.0.9-51.el4_8.s390", "4AS:seamonkey-mail-0:1.0.9-51.el4_8.s390x", "4AS:seamonkey-mail-0:1.0.9-51.el4_8.x86_64", "4Desktop:seamonkey-0:1.0.9-51.el4_8.i386", "4Desktop:seamonkey-0:1.0.9-51.el4_8.ia64", "4Desktop:seamonkey-0:1.0.9-51.el4_8.ppc", "4Desktop:seamonkey-0:1.0.9-51.el4_8.s390", "4Desktop:seamonkey-0:1.0.9-51.el4_8.s390x", "4Desktop:seamonkey-0:1.0.9-51.el4_8.src", "4Desktop:seamonkey-0:1.0.9-51.el4_8.x86_64", "4Desktop:seamonkey-chat-0:1.0.9-51.el4_8.i386", "4Desktop:seamonkey-chat-0:1.0.9-51.el4_8.ia64", "4Desktop:seamonkey-chat-0:1.0.9-51.el4_8.ppc", "4Desktop:seamonkey-chat-0:1.0.9-51.el4_8.s390", "4Desktop:seamonkey-chat-0:1.0.9-51.el4_8.s390x", "4Desktop:seamonkey-chat-0:1.0.9-51.el4_8.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.9-51.el4_8.i386", "4Desktop:seamonkey-debuginfo-0:1.0.9-51.el4_8.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.9-51.el4_8.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.9-51.el4_8.s390", "4Desktop:seamonkey-debuginfo-0:1.0.9-51.el4_8.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.9-51.el4_8.x86_64", "4Desktop:seamonkey-devel-0:1.0.9-51.el4_8.i386", "4Desktop:seamonkey-devel-0:1.0.9-51.el4_8.ia64", "4Desktop:seamonkey-devel-0:1.0.9-51.el4_8.ppc", "4Desktop:seamonkey-devel-0:1.0.9-51.el4_8.s390", "4Desktop:seamonkey-devel-0:1.0.9-51.el4_8.s390x", "4Desktop:seamonkey-devel-0:1.0.9-51.el4_8.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.9-51.el4_8.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.9-51.el4_8.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.9-51.el4_8.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.9-51.el4_8.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.9-51.el4_8.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.9-51.el4_8.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.9-51.el4_8.i386", "4Desktop:seamonkey-js-debugger-0:1.0.9-51.el4_8.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.9-51.el4_8.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.9-51.el4_8.s390", "4Desktop:seamonkey-js-debugger-0:1.0.9-51.el4_8.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.9-51.el4_8.x86_64", "4Desktop:seamonkey-mail-0:1.0.9-51.el4_8.i386", "4Desktop:seamonkey-mail-0:1.0.9-51.el4_8.ia64", "4Desktop:seamonkey-mail-0:1.0.9-51.el4_8.ppc", "4Desktop:seamonkey-mail-0:1.0.9-51.el4_8.s390", "4Desktop:seamonkey-mail-0:1.0.9-51.el4_8.s390x", "4Desktop:seamonkey-mail-0:1.0.9-51.el4_8.x86_64", "4ES:seamonkey-0:1.0.9-51.el4_8.i386", "4ES:seamonkey-0:1.0.9-51.el4_8.ia64", "4ES:seamonkey-0:1.0.9-51.el4_8.ppc", "4ES:seamonkey-0:1.0.9-51.el4_8.s390", "4ES:seamonkey-0:1.0.9-51.el4_8.s390x", "4ES:seamonkey-0:1.0.9-51.el4_8.src", "4ES:seamonkey-0:1.0.9-51.el4_8.x86_64", "4ES:seamonkey-chat-0:1.0.9-51.el4_8.i386", "4ES:seamonkey-chat-0:1.0.9-51.el4_8.ia64", "4ES:seamonkey-chat-0:1.0.9-51.el4_8.ppc", "4ES:seamonkey-chat-0:1.0.9-51.el4_8.s390", "4ES:seamonkey-chat-0:1.0.9-51.el4_8.s390x", "4ES:seamonkey-chat-0:1.0.9-51.el4_8.x86_64", "4ES:seamonkey-debuginfo-0:1.0.9-51.el4_8.i386", "4ES:seamonkey-debuginfo-0:1.0.9-51.el4_8.ia64", "4ES:seamonkey-debuginfo-0:1.0.9-51.el4_8.ppc", "4ES:seamonkey-debuginfo-0:1.0.9-51.el4_8.s390", "4ES:seamonkey-debuginfo-0:1.0.9-51.el4_8.s390x", "4ES:seamonkey-debuginfo-0:1.0.9-51.el4_8.x86_64", "4ES:seamonkey-devel-0:1.0.9-51.el4_8.i386", "4ES:seamonkey-devel-0:1.0.9-51.el4_8.ia64", "4ES:seamonkey-devel-0:1.0.9-51.el4_8.ppc", "4ES:seamonkey-devel-0:1.0.9-51.el4_8.s390", "4ES:seamonkey-devel-0:1.0.9-51.el4_8.s390x", "4ES:seamonkey-devel-0:1.0.9-51.el4_8.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.9-51.el4_8.i386", "4ES:seamonkey-dom-inspector-0:1.0.9-51.el4_8.ia64", "4ES:seamonkey-dom-inspector-0:1.0.9-51.el4_8.ppc", "4ES:seamonkey-dom-inspector-0:1.0.9-51.el4_8.s390", "4ES:seamonkey-dom-inspector-0:1.0.9-51.el4_8.s390x", "4ES:seamonkey-dom-inspector-0:1.0.9-51.el4_8.x86_64", "4ES:seamonkey-js-debugger-0:1.0.9-51.el4_8.i386", "4ES:seamonkey-js-debugger-0:1.0.9-51.el4_8.ia64", "4ES:seamonkey-js-debugger-0:1.0.9-51.el4_8.ppc", "4ES:seamonkey-js-debugger-0:1.0.9-51.el4_8.s390", "4ES:seamonkey-js-debugger-0:1.0.9-51.el4_8.s390x", "4ES:seamonkey-js-debugger-0:1.0.9-51.el4_8.x86_64", "4ES:seamonkey-mail-0:1.0.9-51.el4_8.i386", "4ES:seamonkey-mail-0:1.0.9-51.el4_8.ia64", "4ES:seamonkey-mail-0:1.0.9-51.el4_8.ppc", "4ES:seamonkey-mail-0:1.0.9-51.el4_8.s390", "4ES:seamonkey-mail-0:1.0.9-51.el4_8.s390x", "4ES:seamonkey-mail-0:1.0.9-51.el4_8.x86_64", "4WS:seamonkey-0:1.0.9-51.el4_8.i386", "4WS:seamonkey-0:1.0.9-51.el4_8.ia64", "4WS:seamonkey-0:1.0.9-51.el4_8.ppc", "4WS:seamonkey-0:1.0.9-51.el4_8.s390", "4WS:seamonkey-0:1.0.9-51.el4_8.s390x", "4WS:seamonkey-0:1.0.9-51.el4_8.src", "4WS:seamonkey-0:1.0.9-51.el4_8.x86_64", "4WS:seamonkey-chat-0:1.0.9-51.el4_8.i386", "4WS:seamonkey-chat-0:1.0.9-51.el4_8.ia64", "4WS:seamonkey-chat-0:1.0.9-51.el4_8.ppc", "4WS:seamonkey-chat-0:1.0.9-51.el4_8.s390", "4WS:seamonkey-chat-0:1.0.9-51.el4_8.s390x", "4WS:seamonkey-chat-0:1.0.9-51.el4_8.x86_64", "4WS:seamonkey-debuginfo-0:1.0.9-51.el4_8.i386", "4WS:seamonkey-debuginfo-0:1.0.9-51.el4_8.ia64", "4WS:seamonkey-debuginfo-0:1.0.9-51.el4_8.ppc", "4WS:seamonkey-debuginfo-0:1.0.9-51.el4_8.s390", "4WS:seamonkey-debuginfo-0:1.0.9-51.el4_8.s390x", "4WS:seamonkey-debuginfo-0:1.0.9-51.el4_8.x86_64", "4WS:seamonkey-devel-0:1.0.9-51.el4_8.i386", "4WS:seamonkey-devel-0:1.0.9-51.el4_8.ia64", "4WS:seamonkey-devel-0:1.0.9-51.el4_8.ppc", "4WS:seamonkey-devel-0:1.0.9-51.el4_8.s390", "4WS:seamonkey-devel-0:1.0.9-51.el4_8.s390x", "4WS:seamonkey-devel-0:1.0.9-51.el4_8.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.9-51.el4_8.i386", "4WS:seamonkey-dom-inspector-0:1.0.9-51.el4_8.ia64", "4WS:seamonkey-dom-inspector-0:1.0.9-51.el4_8.ppc", "4WS:seamonkey-dom-inspector-0:1.0.9-51.el4_8.s390", "4WS:seamonkey-dom-inspector-0:1.0.9-51.el4_8.s390x", "4WS:seamonkey-dom-inspector-0:1.0.9-51.el4_8.x86_64", "4WS:seamonkey-js-debugger-0:1.0.9-51.el4_8.i386", "4WS:seamonkey-js-debugger-0:1.0.9-51.el4_8.ia64", "4WS:seamonkey-js-debugger-0:1.0.9-51.el4_8.ppc", "4WS:seamonkey-js-debugger-0:1.0.9-51.el4_8.s390", "4WS:seamonkey-js-debugger-0:1.0.9-51.el4_8.s390x", "4WS:seamonkey-js-debugger-0:1.0.9-51.el4_8.x86_64", "4WS:seamonkey-mail-0:1.0.9-51.el4_8.i386", "4WS:seamonkey-mail-0:1.0.9-51.el4_8.ia64", "4WS:seamonkey-mail-0:1.0.9-51.el4_8.ppc", "4WS:seamonkey-mail-0:1.0.9-51.el4_8.s390", "4WS:seamonkey-mail-0:1.0.9-51.el4_8.s390x", "4WS:seamonkey-mail-0:1.0.9-51.el4_8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1673" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "3AS:seamonkey-0:1.0.9-0.48.el3.i386", "3AS:seamonkey-0:1.0.9-0.48.el3.ia64", "3AS:seamonkey-0:1.0.9-0.48.el3.ppc", "3AS:seamonkey-0:1.0.9-0.48.el3.s390", "3AS:seamonkey-0:1.0.9-0.48.el3.s390x", "3AS:seamonkey-0:1.0.9-0.48.el3.src", "3AS:seamonkey-0:1.0.9-0.48.el3.x86_64", "3AS:seamonkey-chat-0:1.0.9-0.48.el3.i386", "3AS:seamonkey-chat-0:1.0.9-0.48.el3.ia64", "3AS:seamonkey-chat-0:1.0.9-0.48.el3.ppc", "3AS:seamonkey-chat-0:1.0.9-0.48.el3.s390", "3AS:seamonkey-chat-0:1.0.9-0.48.el3.s390x", "3AS:seamonkey-chat-0:1.0.9-0.48.el3.x86_64", "3AS:seamonkey-debuginfo-0:1.0.9-0.48.el3.i386", "3AS:seamonkey-debuginfo-0:1.0.9-0.48.el3.ia64", "3AS:seamonkey-debuginfo-0:1.0.9-0.48.el3.ppc", "3AS:seamonkey-debuginfo-0:1.0.9-0.48.el3.s390", "3AS:seamonkey-debuginfo-0:1.0.9-0.48.el3.s390x", "3AS:seamonkey-debuginfo-0:1.0.9-0.48.el3.x86_64", "3AS:seamonkey-devel-0:1.0.9-0.48.el3.i386", "3AS:seamonkey-devel-0:1.0.9-0.48.el3.ia64", "3AS:seamonkey-devel-0:1.0.9-0.48.el3.ppc", "3AS:seamonkey-devel-0:1.0.9-0.48.el3.s390", "3AS:seamonkey-devel-0:1.0.9-0.48.el3.s390x", "3AS:seamonkey-devel-0:1.0.9-0.48.el3.x86_64", "3AS:seamonkey-dom-inspector-0:1.0.9-0.48.el3.i386", "3AS:seamonkey-dom-inspector-0:1.0.9-0.48.el3.ia64", "3AS:seamonkey-dom-inspector-0:1.0.9-0.48.el3.ppc", "3AS:seamonkey-dom-inspector-0:1.0.9-0.48.el3.s390", "3AS:seamonkey-dom-inspector-0:1.0.9-0.48.el3.s390x", "3AS:seamonkey-dom-inspector-0:1.0.9-0.48.el3.x86_64", "3AS:seamonkey-js-debugger-0:1.0.9-0.48.el3.i386", "3AS:seamonkey-js-debugger-0:1.0.9-0.48.el3.ia64", "3AS:seamonkey-js-debugger-0:1.0.9-0.48.el3.ppc", "3AS:seamonkey-js-debugger-0:1.0.9-0.48.el3.s390", "3AS:seamonkey-js-debugger-0:1.0.9-0.48.el3.s390x", "3AS:seamonkey-js-debugger-0:1.0.9-0.48.el3.x86_64", "3AS:seamonkey-mail-0:1.0.9-0.48.el3.i386", "3AS:seamonkey-mail-0:1.0.9-0.48.el3.ia64", "3AS:seamonkey-mail-0:1.0.9-0.48.el3.ppc", "3AS:seamonkey-mail-0:1.0.9-0.48.el3.s390", "3AS:seamonkey-mail-0:1.0.9-0.48.el3.s390x", "3AS:seamonkey-mail-0:1.0.9-0.48.el3.x86_64", "3AS:seamonkey-nspr-0:1.0.9-0.48.el3.i386", "3AS:seamonkey-nspr-0:1.0.9-0.48.el3.ia64", "3AS:seamonkey-nspr-0:1.0.9-0.48.el3.ppc", "3AS:seamonkey-nspr-0:1.0.9-0.48.el3.s390", "3AS:seamonkey-nspr-0:1.0.9-0.48.el3.s390x", "3AS:seamonkey-nspr-0:1.0.9-0.48.el3.x86_64", "3AS:seamonkey-nspr-devel-0:1.0.9-0.48.el3.i386", "3AS:seamonkey-nspr-devel-0:1.0.9-0.48.el3.ia64", "3AS:seamonkey-nspr-devel-0:1.0.9-0.48.el3.ppc", "3AS:seamonkey-nspr-devel-0:1.0.9-0.48.el3.s390", "3AS:seamonkey-nspr-devel-0:1.0.9-0.48.el3.s390x", "3AS:seamonkey-nspr-devel-0:1.0.9-0.48.el3.x86_64", "3AS:seamonkey-nss-0:1.0.9-0.48.el3.i386", "3AS:seamonkey-nss-0:1.0.9-0.48.el3.ia64", "3AS:seamonkey-nss-0:1.0.9-0.48.el3.ppc", "3AS:seamonkey-nss-0:1.0.9-0.48.el3.s390", "3AS:seamonkey-nss-0:1.0.9-0.48.el3.s390x", "3AS:seamonkey-nss-0:1.0.9-0.48.el3.x86_64", "3AS:seamonkey-nss-devel-0:1.0.9-0.48.el3.i386", "3AS:seamonkey-nss-devel-0:1.0.9-0.48.el3.ia64", "3AS:seamonkey-nss-devel-0:1.0.9-0.48.el3.ppc", "3AS:seamonkey-nss-devel-0:1.0.9-0.48.el3.s390", "3AS:seamonkey-nss-devel-0:1.0.9-0.48.el3.s390x", "3AS:seamonkey-nss-devel-0:1.0.9-0.48.el3.x86_64", "3Desktop:seamonkey-0:1.0.9-0.48.el3.i386", "3Desktop:seamonkey-0:1.0.9-0.48.el3.ia64", "3Desktop:seamonkey-0:1.0.9-0.48.el3.ppc", "3Desktop:seamonkey-0:1.0.9-0.48.el3.s390", "3Desktop:seamonkey-0:1.0.9-0.48.el3.s390x", "3Desktop:seamonkey-0:1.0.9-0.48.el3.src", "3Desktop:seamonkey-0:1.0.9-0.48.el3.x86_64", "3Desktop:seamonkey-chat-0:1.0.9-0.48.el3.i386", "3Desktop:seamonkey-chat-0:1.0.9-0.48.el3.ia64", "3Desktop:seamonkey-chat-0:1.0.9-0.48.el3.ppc", "3Desktop:seamonkey-chat-0:1.0.9-0.48.el3.s390", "3Desktop:seamonkey-chat-0:1.0.9-0.48.el3.s390x", "3Desktop:seamonkey-chat-0:1.0.9-0.48.el3.x86_64", "3Desktop:seamonkey-debuginfo-0:1.0.9-0.48.el3.i386", "3Desktop:seamonkey-debuginfo-0:1.0.9-0.48.el3.ia64", "3Desktop:seamonkey-debuginfo-0:1.0.9-0.48.el3.ppc", "3Desktop:seamonkey-debuginfo-0:1.0.9-0.48.el3.s390", "3Desktop:seamonkey-debuginfo-0:1.0.9-0.48.el3.s390x", "3Desktop:seamonkey-debuginfo-0:1.0.9-0.48.el3.x86_64", "3Desktop:seamonkey-devel-0:1.0.9-0.48.el3.i386", "3Desktop:seamonkey-devel-0:1.0.9-0.48.el3.ia64", "3Desktop:seamonkey-devel-0:1.0.9-0.48.el3.ppc", "3Desktop:seamonkey-devel-0:1.0.9-0.48.el3.s390", "3Desktop:seamonkey-devel-0:1.0.9-0.48.el3.s390x", "3Desktop:seamonkey-devel-0:1.0.9-0.48.el3.x86_64", "3Desktop:seamonkey-dom-inspector-0:1.0.9-0.48.el3.i386", "3Desktop:seamonkey-dom-inspector-0:1.0.9-0.48.el3.ia64", "3Desktop:seamonkey-dom-inspector-0:1.0.9-0.48.el3.ppc", "3Desktop:seamonkey-dom-inspector-0:1.0.9-0.48.el3.s390", "3Desktop:seamonkey-dom-inspector-0:1.0.9-0.48.el3.s390x", "3Desktop:seamonkey-dom-inspector-0:1.0.9-0.48.el3.x86_64", "3Desktop:seamonkey-js-debugger-0:1.0.9-0.48.el3.i386", "3Desktop:seamonkey-js-debugger-0:1.0.9-0.48.el3.ia64", "3Desktop:seamonkey-js-debugger-0:1.0.9-0.48.el3.ppc", "3Desktop:seamonkey-js-debugger-0:1.0.9-0.48.el3.s390", "3Desktop:seamonkey-js-debugger-0:1.0.9-0.48.el3.s390x", "3Desktop:seamonkey-js-debugger-0:1.0.9-0.48.el3.x86_64", "3Desktop:seamonkey-mail-0:1.0.9-0.48.el3.i386", "3Desktop:seamonkey-mail-0:1.0.9-0.48.el3.ia64", "3Desktop:seamonkey-mail-0:1.0.9-0.48.el3.ppc", "3Desktop:seamonkey-mail-0:1.0.9-0.48.el3.s390", "3Desktop:seamonkey-mail-0:1.0.9-0.48.el3.s390x", "3Desktop:seamonkey-mail-0:1.0.9-0.48.el3.x86_64", "3Desktop:seamonkey-nspr-0:1.0.9-0.48.el3.i386", "3Desktop:seamonkey-nspr-0:1.0.9-0.48.el3.ia64", "3Desktop:seamonkey-nspr-0:1.0.9-0.48.el3.ppc", "3Desktop:seamonkey-nspr-0:1.0.9-0.48.el3.s390", "3Desktop:seamonkey-nspr-0:1.0.9-0.48.el3.s390x", "3Desktop:seamonkey-nspr-0:1.0.9-0.48.el3.x86_64", "3Desktop:seamonkey-nspr-devel-0:1.0.9-0.48.el3.i386", "3Desktop:seamonkey-nspr-devel-0:1.0.9-0.48.el3.ia64", "3Desktop:seamonkey-nspr-devel-0:1.0.9-0.48.el3.ppc", "3Desktop:seamonkey-nspr-devel-0:1.0.9-0.48.el3.s390", "3Desktop:seamonkey-nspr-devel-0:1.0.9-0.48.el3.s390x", "3Desktop:seamonkey-nspr-devel-0:1.0.9-0.48.el3.x86_64", "3Desktop:seamonkey-nss-0:1.0.9-0.48.el3.i386", "3Desktop:seamonkey-nss-0:1.0.9-0.48.el3.ia64", "3Desktop:seamonkey-nss-0:1.0.9-0.48.el3.ppc", "3Desktop:seamonkey-nss-0:1.0.9-0.48.el3.s390", "3Desktop:seamonkey-nss-0:1.0.9-0.48.el3.s390x", "3Desktop:seamonkey-nss-0:1.0.9-0.48.el3.x86_64", "3Desktop:seamonkey-nss-devel-0:1.0.9-0.48.el3.i386", "3Desktop:seamonkey-nss-devel-0:1.0.9-0.48.el3.ia64", "3Desktop:seamonkey-nss-devel-0:1.0.9-0.48.el3.ppc", "3Desktop:seamonkey-nss-devel-0:1.0.9-0.48.el3.s390", "3Desktop:seamonkey-nss-devel-0:1.0.9-0.48.el3.s390x", "3Desktop:seamonkey-nss-devel-0:1.0.9-0.48.el3.x86_64", "3ES:seamonkey-0:1.0.9-0.48.el3.i386", "3ES:seamonkey-0:1.0.9-0.48.el3.ia64", "3ES:seamonkey-0:1.0.9-0.48.el3.ppc", "3ES:seamonkey-0:1.0.9-0.48.el3.s390", "3ES:seamonkey-0:1.0.9-0.48.el3.s390x", "3ES:seamonkey-0:1.0.9-0.48.el3.src", "3ES:seamonkey-0:1.0.9-0.48.el3.x86_64", "3ES:seamonkey-chat-0:1.0.9-0.48.el3.i386", "3ES:seamonkey-chat-0:1.0.9-0.48.el3.ia64", "3ES:seamonkey-chat-0:1.0.9-0.48.el3.ppc", "3ES:seamonkey-chat-0:1.0.9-0.48.el3.s390", "3ES:seamonkey-chat-0:1.0.9-0.48.el3.s390x", "3ES:seamonkey-chat-0:1.0.9-0.48.el3.x86_64", "3ES:seamonkey-debuginfo-0:1.0.9-0.48.el3.i386", "3ES:seamonkey-debuginfo-0:1.0.9-0.48.el3.ia64", "3ES:seamonkey-debuginfo-0:1.0.9-0.48.el3.ppc", "3ES:seamonkey-debuginfo-0:1.0.9-0.48.el3.s390", "3ES:seamonkey-debuginfo-0:1.0.9-0.48.el3.s390x", "3ES:seamonkey-debuginfo-0:1.0.9-0.48.el3.x86_64", "3ES:seamonkey-devel-0:1.0.9-0.48.el3.i386", "3ES:seamonkey-devel-0:1.0.9-0.48.el3.ia64", "3ES:seamonkey-devel-0:1.0.9-0.48.el3.ppc", "3ES:seamonkey-devel-0:1.0.9-0.48.el3.s390", "3ES:seamonkey-devel-0:1.0.9-0.48.el3.s390x", "3ES:seamonkey-devel-0:1.0.9-0.48.el3.x86_64", "3ES:seamonkey-dom-inspector-0:1.0.9-0.48.el3.i386", "3ES:seamonkey-dom-inspector-0:1.0.9-0.48.el3.ia64", "3ES:seamonkey-dom-inspector-0:1.0.9-0.48.el3.ppc", "3ES:seamonkey-dom-inspector-0:1.0.9-0.48.el3.s390", "3ES:seamonkey-dom-inspector-0:1.0.9-0.48.el3.s390x", "3ES:seamonkey-dom-inspector-0:1.0.9-0.48.el3.x86_64", "3ES:seamonkey-js-debugger-0:1.0.9-0.48.el3.i386", "3ES:seamonkey-js-debugger-0:1.0.9-0.48.el3.ia64", "3ES:seamonkey-js-debugger-0:1.0.9-0.48.el3.ppc", "3ES:seamonkey-js-debugger-0:1.0.9-0.48.el3.s390", "3ES:seamonkey-js-debugger-0:1.0.9-0.48.el3.s390x", "3ES:seamonkey-js-debugger-0:1.0.9-0.48.el3.x86_64", "3ES:seamonkey-mail-0:1.0.9-0.48.el3.i386", "3ES:seamonkey-mail-0:1.0.9-0.48.el3.ia64", "3ES:seamonkey-mail-0:1.0.9-0.48.el3.ppc", "3ES:seamonkey-mail-0:1.0.9-0.48.el3.s390", "3ES:seamonkey-mail-0:1.0.9-0.48.el3.s390x", "3ES:seamonkey-mail-0:1.0.9-0.48.el3.x86_64", "3ES:seamonkey-nspr-0:1.0.9-0.48.el3.i386", "3ES:seamonkey-nspr-0:1.0.9-0.48.el3.ia64", "3ES:seamonkey-nspr-0:1.0.9-0.48.el3.ppc", "3ES:seamonkey-nspr-0:1.0.9-0.48.el3.s390", "3ES:seamonkey-nspr-0:1.0.9-0.48.el3.s390x", "3ES:seamonkey-nspr-0:1.0.9-0.48.el3.x86_64", "3ES:seamonkey-nspr-devel-0:1.0.9-0.48.el3.i386", "3ES:seamonkey-nspr-devel-0:1.0.9-0.48.el3.ia64", "3ES:seamonkey-nspr-devel-0:1.0.9-0.48.el3.ppc", "3ES:seamonkey-nspr-devel-0:1.0.9-0.48.el3.s390", "3ES:seamonkey-nspr-devel-0:1.0.9-0.48.el3.s390x", "3ES:seamonkey-nspr-devel-0:1.0.9-0.48.el3.x86_64", "3ES:seamonkey-nss-0:1.0.9-0.48.el3.i386", "3ES:seamonkey-nss-0:1.0.9-0.48.el3.ia64", "3ES:seamonkey-nss-0:1.0.9-0.48.el3.ppc", "3ES:seamonkey-nss-0:1.0.9-0.48.el3.s390", "3ES:seamonkey-nss-0:1.0.9-0.48.el3.s390x", "3ES:seamonkey-nss-0:1.0.9-0.48.el3.x86_64", "3ES:seamonkey-nss-devel-0:1.0.9-0.48.el3.i386", "3ES:seamonkey-nss-devel-0:1.0.9-0.48.el3.ia64", "3ES:seamonkey-nss-devel-0:1.0.9-0.48.el3.ppc", "3ES:seamonkey-nss-devel-0:1.0.9-0.48.el3.s390", "3ES:seamonkey-nss-devel-0:1.0.9-0.48.el3.s390x", "3ES:seamonkey-nss-devel-0:1.0.9-0.48.el3.x86_64", "3WS:seamonkey-0:1.0.9-0.48.el3.i386", "3WS:seamonkey-0:1.0.9-0.48.el3.ia64", "3WS:seamonkey-0:1.0.9-0.48.el3.ppc", "3WS:seamonkey-0:1.0.9-0.48.el3.s390", "3WS:seamonkey-0:1.0.9-0.48.el3.s390x", "3WS:seamonkey-0:1.0.9-0.48.el3.src", "3WS:seamonkey-0:1.0.9-0.48.el3.x86_64", "3WS:seamonkey-chat-0:1.0.9-0.48.el3.i386", "3WS:seamonkey-chat-0:1.0.9-0.48.el3.ia64", "3WS:seamonkey-chat-0:1.0.9-0.48.el3.ppc", "3WS:seamonkey-chat-0:1.0.9-0.48.el3.s390", "3WS:seamonkey-chat-0:1.0.9-0.48.el3.s390x", "3WS:seamonkey-chat-0:1.0.9-0.48.el3.x86_64", "3WS:seamonkey-debuginfo-0:1.0.9-0.48.el3.i386", "3WS:seamonkey-debuginfo-0:1.0.9-0.48.el3.ia64", "3WS:seamonkey-debuginfo-0:1.0.9-0.48.el3.ppc", "3WS:seamonkey-debuginfo-0:1.0.9-0.48.el3.s390", "3WS:seamonkey-debuginfo-0:1.0.9-0.48.el3.s390x", "3WS:seamonkey-debuginfo-0:1.0.9-0.48.el3.x86_64", "3WS:seamonkey-devel-0:1.0.9-0.48.el3.i386", "3WS:seamonkey-devel-0:1.0.9-0.48.el3.ia64", "3WS:seamonkey-devel-0:1.0.9-0.48.el3.ppc", "3WS:seamonkey-devel-0:1.0.9-0.48.el3.s390", "3WS:seamonkey-devel-0:1.0.9-0.48.el3.s390x", "3WS:seamonkey-devel-0:1.0.9-0.48.el3.x86_64", "3WS:seamonkey-dom-inspector-0:1.0.9-0.48.el3.i386", "3WS:seamonkey-dom-inspector-0:1.0.9-0.48.el3.ia64", "3WS:seamonkey-dom-inspector-0:1.0.9-0.48.el3.ppc", "3WS:seamonkey-dom-inspector-0:1.0.9-0.48.el3.s390", "3WS:seamonkey-dom-inspector-0:1.0.9-0.48.el3.s390x", "3WS:seamonkey-dom-inspector-0:1.0.9-0.48.el3.x86_64", "3WS:seamonkey-js-debugger-0:1.0.9-0.48.el3.i386", "3WS:seamonkey-js-debugger-0:1.0.9-0.48.el3.ia64", "3WS:seamonkey-js-debugger-0:1.0.9-0.48.el3.ppc", "3WS:seamonkey-js-debugger-0:1.0.9-0.48.el3.s390", "3WS:seamonkey-js-debugger-0:1.0.9-0.48.el3.s390x", "3WS:seamonkey-js-debugger-0:1.0.9-0.48.el3.x86_64", "3WS:seamonkey-mail-0:1.0.9-0.48.el3.i386", "3WS:seamonkey-mail-0:1.0.9-0.48.el3.ia64", "3WS:seamonkey-mail-0:1.0.9-0.48.el3.ppc", "3WS:seamonkey-mail-0:1.0.9-0.48.el3.s390", "3WS:seamonkey-mail-0:1.0.9-0.48.el3.s390x", "3WS:seamonkey-mail-0:1.0.9-0.48.el3.x86_64", "3WS:seamonkey-nspr-0:1.0.9-0.48.el3.i386", "3WS:seamonkey-nspr-0:1.0.9-0.48.el3.ia64", "3WS:seamonkey-nspr-0:1.0.9-0.48.el3.ppc", "3WS:seamonkey-nspr-0:1.0.9-0.48.el3.s390", "3WS:seamonkey-nspr-0:1.0.9-0.48.el3.s390x", "3WS:seamonkey-nspr-0:1.0.9-0.48.el3.x86_64", "3WS:seamonkey-nspr-devel-0:1.0.9-0.48.el3.i386", "3WS:seamonkey-nspr-devel-0:1.0.9-0.48.el3.ia64", "3WS:seamonkey-nspr-devel-0:1.0.9-0.48.el3.ppc", "3WS:seamonkey-nspr-devel-0:1.0.9-0.48.el3.s390", "3WS:seamonkey-nspr-devel-0:1.0.9-0.48.el3.s390x", "3WS:seamonkey-nspr-devel-0:1.0.9-0.48.el3.x86_64", "3WS:seamonkey-nss-0:1.0.9-0.48.el3.i386", "3WS:seamonkey-nss-0:1.0.9-0.48.el3.ia64", "3WS:seamonkey-nss-0:1.0.9-0.48.el3.ppc", "3WS:seamonkey-nss-0:1.0.9-0.48.el3.s390", "3WS:seamonkey-nss-0:1.0.9-0.48.el3.s390x", "3WS:seamonkey-nss-0:1.0.9-0.48.el3.x86_64", "3WS:seamonkey-nss-devel-0:1.0.9-0.48.el3.i386", "3WS:seamonkey-nss-devel-0:1.0.9-0.48.el3.ia64", "3WS:seamonkey-nss-devel-0:1.0.9-0.48.el3.ppc", "3WS:seamonkey-nss-devel-0:1.0.9-0.48.el3.s390", "3WS:seamonkey-nss-devel-0:1.0.9-0.48.el3.s390x", "3WS:seamonkey-nss-devel-0:1.0.9-0.48.el3.x86_64", "4AS:seamonkey-0:1.0.9-51.el4_8.i386", "4AS:seamonkey-0:1.0.9-51.el4_8.ia64", "4AS:seamonkey-0:1.0.9-51.el4_8.ppc", "4AS:seamonkey-0:1.0.9-51.el4_8.s390", "4AS:seamonkey-0:1.0.9-51.el4_8.s390x", "4AS:seamonkey-0:1.0.9-51.el4_8.src", "4AS:seamonkey-0:1.0.9-51.el4_8.x86_64", "4AS:seamonkey-chat-0:1.0.9-51.el4_8.i386", "4AS:seamonkey-chat-0:1.0.9-51.el4_8.ia64", "4AS:seamonkey-chat-0:1.0.9-51.el4_8.ppc", "4AS:seamonkey-chat-0:1.0.9-51.el4_8.s390", "4AS:seamonkey-chat-0:1.0.9-51.el4_8.s390x", "4AS:seamonkey-chat-0:1.0.9-51.el4_8.x86_64", "4AS:seamonkey-debuginfo-0:1.0.9-51.el4_8.i386", "4AS:seamonkey-debuginfo-0:1.0.9-51.el4_8.ia64", "4AS:seamonkey-debuginfo-0:1.0.9-51.el4_8.ppc", "4AS:seamonkey-debuginfo-0:1.0.9-51.el4_8.s390", "4AS:seamonkey-debuginfo-0:1.0.9-51.el4_8.s390x", "4AS:seamonkey-debuginfo-0:1.0.9-51.el4_8.x86_64", "4AS:seamonkey-devel-0:1.0.9-51.el4_8.i386", "4AS:seamonkey-devel-0:1.0.9-51.el4_8.ia64", "4AS:seamonkey-devel-0:1.0.9-51.el4_8.ppc", "4AS:seamonkey-devel-0:1.0.9-51.el4_8.s390", "4AS:seamonkey-devel-0:1.0.9-51.el4_8.s390x", "4AS:seamonkey-devel-0:1.0.9-51.el4_8.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.9-51.el4_8.i386", "4AS:seamonkey-dom-inspector-0:1.0.9-51.el4_8.ia64", "4AS:seamonkey-dom-inspector-0:1.0.9-51.el4_8.ppc", "4AS:seamonkey-dom-inspector-0:1.0.9-51.el4_8.s390", "4AS:seamonkey-dom-inspector-0:1.0.9-51.el4_8.s390x", "4AS:seamonkey-dom-inspector-0:1.0.9-51.el4_8.x86_64", "4AS:seamonkey-js-debugger-0:1.0.9-51.el4_8.i386", "4AS:seamonkey-js-debugger-0:1.0.9-51.el4_8.ia64", "4AS:seamonkey-js-debugger-0:1.0.9-51.el4_8.ppc", "4AS:seamonkey-js-debugger-0:1.0.9-51.el4_8.s390", "4AS:seamonkey-js-debugger-0:1.0.9-51.el4_8.s390x", "4AS:seamonkey-js-debugger-0:1.0.9-51.el4_8.x86_64", "4AS:seamonkey-mail-0:1.0.9-51.el4_8.i386", "4AS:seamonkey-mail-0:1.0.9-51.el4_8.ia64", "4AS:seamonkey-mail-0:1.0.9-51.el4_8.ppc", "4AS:seamonkey-mail-0:1.0.9-51.el4_8.s390", "4AS:seamonkey-mail-0:1.0.9-51.el4_8.s390x", "4AS:seamonkey-mail-0:1.0.9-51.el4_8.x86_64", "4Desktop:seamonkey-0:1.0.9-51.el4_8.i386", "4Desktop:seamonkey-0:1.0.9-51.el4_8.ia64", "4Desktop:seamonkey-0:1.0.9-51.el4_8.ppc", "4Desktop:seamonkey-0:1.0.9-51.el4_8.s390", "4Desktop:seamonkey-0:1.0.9-51.el4_8.s390x", "4Desktop:seamonkey-0:1.0.9-51.el4_8.src", "4Desktop:seamonkey-0:1.0.9-51.el4_8.x86_64", "4Desktop:seamonkey-chat-0:1.0.9-51.el4_8.i386", "4Desktop:seamonkey-chat-0:1.0.9-51.el4_8.ia64", "4Desktop:seamonkey-chat-0:1.0.9-51.el4_8.ppc", "4Desktop:seamonkey-chat-0:1.0.9-51.el4_8.s390", "4Desktop:seamonkey-chat-0:1.0.9-51.el4_8.s390x", "4Desktop:seamonkey-chat-0:1.0.9-51.el4_8.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.9-51.el4_8.i386", "4Desktop:seamonkey-debuginfo-0:1.0.9-51.el4_8.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.9-51.el4_8.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.9-51.el4_8.s390", "4Desktop:seamonkey-debuginfo-0:1.0.9-51.el4_8.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.9-51.el4_8.x86_64", "4Desktop:seamonkey-devel-0:1.0.9-51.el4_8.i386", "4Desktop:seamonkey-devel-0:1.0.9-51.el4_8.ia64", "4Desktop:seamonkey-devel-0:1.0.9-51.el4_8.ppc", "4Desktop:seamonkey-devel-0:1.0.9-51.el4_8.s390", "4Desktop:seamonkey-devel-0:1.0.9-51.el4_8.s390x", "4Desktop:seamonkey-devel-0:1.0.9-51.el4_8.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.9-51.el4_8.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.9-51.el4_8.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.9-51.el4_8.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.9-51.el4_8.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.9-51.el4_8.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.9-51.el4_8.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.9-51.el4_8.i386", "4Desktop:seamonkey-js-debugger-0:1.0.9-51.el4_8.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.9-51.el4_8.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.9-51.el4_8.s390", "4Desktop:seamonkey-js-debugger-0:1.0.9-51.el4_8.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.9-51.el4_8.x86_64", "4Desktop:seamonkey-mail-0:1.0.9-51.el4_8.i386", "4Desktop:seamonkey-mail-0:1.0.9-51.el4_8.ia64", "4Desktop:seamonkey-mail-0:1.0.9-51.el4_8.ppc", "4Desktop:seamonkey-mail-0:1.0.9-51.el4_8.s390", "4Desktop:seamonkey-mail-0:1.0.9-51.el4_8.s390x", "4Desktop:seamonkey-mail-0:1.0.9-51.el4_8.x86_64", "4ES:seamonkey-0:1.0.9-51.el4_8.i386", "4ES:seamonkey-0:1.0.9-51.el4_8.ia64", "4ES:seamonkey-0:1.0.9-51.el4_8.ppc", "4ES:seamonkey-0:1.0.9-51.el4_8.s390", "4ES:seamonkey-0:1.0.9-51.el4_8.s390x", "4ES:seamonkey-0:1.0.9-51.el4_8.src", "4ES:seamonkey-0:1.0.9-51.el4_8.x86_64", "4ES:seamonkey-chat-0:1.0.9-51.el4_8.i386", "4ES:seamonkey-chat-0:1.0.9-51.el4_8.ia64", "4ES:seamonkey-chat-0:1.0.9-51.el4_8.ppc", "4ES:seamonkey-chat-0:1.0.9-51.el4_8.s390", "4ES:seamonkey-chat-0:1.0.9-51.el4_8.s390x", "4ES:seamonkey-chat-0:1.0.9-51.el4_8.x86_64", "4ES:seamonkey-debuginfo-0:1.0.9-51.el4_8.i386", "4ES:seamonkey-debuginfo-0:1.0.9-51.el4_8.ia64", "4ES:seamonkey-debuginfo-0:1.0.9-51.el4_8.ppc", "4ES:seamonkey-debuginfo-0:1.0.9-51.el4_8.s390", "4ES:seamonkey-debuginfo-0:1.0.9-51.el4_8.s390x", "4ES:seamonkey-debuginfo-0:1.0.9-51.el4_8.x86_64", "4ES:seamonkey-devel-0:1.0.9-51.el4_8.i386", "4ES:seamonkey-devel-0:1.0.9-51.el4_8.ia64", "4ES:seamonkey-devel-0:1.0.9-51.el4_8.ppc", "4ES:seamonkey-devel-0:1.0.9-51.el4_8.s390", "4ES:seamonkey-devel-0:1.0.9-51.el4_8.s390x", "4ES:seamonkey-devel-0:1.0.9-51.el4_8.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.9-51.el4_8.i386", "4ES:seamonkey-dom-inspector-0:1.0.9-51.el4_8.ia64", "4ES:seamonkey-dom-inspector-0:1.0.9-51.el4_8.ppc", "4ES:seamonkey-dom-inspector-0:1.0.9-51.el4_8.s390", "4ES:seamonkey-dom-inspector-0:1.0.9-51.el4_8.s390x", "4ES:seamonkey-dom-inspector-0:1.0.9-51.el4_8.x86_64", "4ES:seamonkey-js-debugger-0:1.0.9-51.el4_8.i386", "4ES:seamonkey-js-debugger-0:1.0.9-51.el4_8.ia64", "4ES:seamonkey-js-debugger-0:1.0.9-51.el4_8.ppc", "4ES:seamonkey-js-debugger-0:1.0.9-51.el4_8.s390", "4ES:seamonkey-js-debugger-0:1.0.9-51.el4_8.s390x", "4ES:seamonkey-js-debugger-0:1.0.9-51.el4_8.x86_64", "4ES:seamonkey-mail-0:1.0.9-51.el4_8.i386", "4ES:seamonkey-mail-0:1.0.9-51.el4_8.ia64", "4ES:seamonkey-mail-0:1.0.9-51.el4_8.ppc", "4ES:seamonkey-mail-0:1.0.9-51.el4_8.s390", "4ES:seamonkey-mail-0:1.0.9-51.el4_8.s390x", "4ES:seamonkey-mail-0:1.0.9-51.el4_8.x86_64", "4WS:seamonkey-0:1.0.9-51.el4_8.i386", "4WS:seamonkey-0:1.0.9-51.el4_8.ia64", "4WS:seamonkey-0:1.0.9-51.el4_8.ppc", "4WS:seamonkey-0:1.0.9-51.el4_8.s390", "4WS:seamonkey-0:1.0.9-51.el4_8.s390x", "4WS:seamonkey-0:1.0.9-51.el4_8.src", "4WS:seamonkey-0:1.0.9-51.el4_8.x86_64", "4WS:seamonkey-chat-0:1.0.9-51.el4_8.i386", "4WS:seamonkey-chat-0:1.0.9-51.el4_8.ia64", "4WS:seamonkey-chat-0:1.0.9-51.el4_8.ppc", "4WS:seamonkey-chat-0:1.0.9-51.el4_8.s390", "4WS:seamonkey-chat-0:1.0.9-51.el4_8.s390x", "4WS:seamonkey-chat-0:1.0.9-51.el4_8.x86_64", "4WS:seamonkey-debuginfo-0:1.0.9-51.el4_8.i386", "4WS:seamonkey-debuginfo-0:1.0.9-51.el4_8.ia64", "4WS:seamonkey-debuginfo-0:1.0.9-51.el4_8.ppc", "4WS:seamonkey-debuginfo-0:1.0.9-51.el4_8.s390", "4WS:seamonkey-debuginfo-0:1.0.9-51.el4_8.s390x", "4WS:seamonkey-debuginfo-0:1.0.9-51.el4_8.x86_64", "4WS:seamonkey-devel-0:1.0.9-51.el4_8.i386", "4WS:seamonkey-devel-0:1.0.9-51.el4_8.ia64", "4WS:seamonkey-devel-0:1.0.9-51.el4_8.ppc", "4WS:seamonkey-devel-0:1.0.9-51.el4_8.s390", "4WS:seamonkey-devel-0:1.0.9-51.el4_8.s390x", "4WS:seamonkey-devel-0:1.0.9-51.el4_8.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.9-51.el4_8.i386", "4WS:seamonkey-dom-inspector-0:1.0.9-51.el4_8.ia64", "4WS:seamonkey-dom-inspector-0:1.0.9-51.el4_8.ppc", "4WS:seamonkey-dom-inspector-0:1.0.9-51.el4_8.s390", "4WS:seamonkey-dom-inspector-0:1.0.9-51.el4_8.s390x", "4WS:seamonkey-dom-inspector-0:1.0.9-51.el4_8.x86_64", "4WS:seamonkey-js-debugger-0:1.0.9-51.el4_8.i386", "4WS:seamonkey-js-debugger-0:1.0.9-51.el4_8.ia64", "4WS:seamonkey-js-debugger-0:1.0.9-51.el4_8.ppc", "4WS:seamonkey-js-debugger-0:1.0.9-51.el4_8.s390", "4WS:seamonkey-js-debugger-0:1.0.9-51.el4_8.s390x", "4WS:seamonkey-js-debugger-0:1.0.9-51.el4_8.x86_64", "4WS:seamonkey-mail-0:1.0.9-51.el4_8.i386", "4WS:seamonkey-mail-0:1.0.9-51.el4_8.ia64", "4WS:seamonkey-mail-0:1.0.9-51.el4_8.ppc", "4WS:seamonkey-mail-0:1.0.9-51.el4_8.s390", "4WS:seamonkey-mail-0:1.0.9-51.el4_8.s390x", "4WS:seamonkey-mail-0:1.0.9-51.el4_8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "Mozilla crash with evidence of memory corruption" }, { "cve": "CVE-2009-3983", "discovery_date": "2009-12-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "546720" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox before 3.0.16 and 3.5.x before 3.5.6, and SeaMonkey before 2.0.1, allows remote attackers to send authenticated requests to arbitrary applications by replaying the NTLM credentials of a browser user.", "title": "Vulnerability description" }, { "category": "summary", "text": "Mozilla NTLM reflection vulnerability", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "3AS:seamonkey-0:1.0.9-0.48.el3.i386", "3AS:seamonkey-0:1.0.9-0.48.el3.ia64", "3AS:seamonkey-0:1.0.9-0.48.el3.ppc", "3AS:seamonkey-0:1.0.9-0.48.el3.s390", "3AS:seamonkey-0:1.0.9-0.48.el3.s390x", "3AS:seamonkey-0:1.0.9-0.48.el3.src", "3AS:seamonkey-0:1.0.9-0.48.el3.x86_64", "3AS:seamonkey-chat-0:1.0.9-0.48.el3.i386", "3AS:seamonkey-chat-0:1.0.9-0.48.el3.ia64", "3AS:seamonkey-chat-0:1.0.9-0.48.el3.ppc", "3AS:seamonkey-chat-0:1.0.9-0.48.el3.s390", "3AS:seamonkey-chat-0:1.0.9-0.48.el3.s390x", "3AS:seamonkey-chat-0:1.0.9-0.48.el3.x86_64", "3AS:seamonkey-debuginfo-0:1.0.9-0.48.el3.i386", "3AS:seamonkey-debuginfo-0:1.0.9-0.48.el3.ia64", "3AS:seamonkey-debuginfo-0:1.0.9-0.48.el3.ppc", "3AS:seamonkey-debuginfo-0:1.0.9-0.48.el3.s390", "3AS:seamonkey-debuginfo-0:1.0.9-0.48.el3.s390x", "3AS:seamonkey-debuginfo-0:1.0.9-0.48.el3.x86_64", "3AS:seamonkey-devel-0:1.0.9-0.48.el3.i386", "3AS:seamonkey-devel-0:1.0.9-0.48.el3.ia64", "3AS:seamonkey-devel-0:1.0.9-0.48.el3.ppc", "3AS:seamonkey-devel-0:1.0.9-0.48.el3.s390", "3AS:seamonkey-devel-0:1.0.9-0.48.el3.s390x", "3AS:seamonkey-devel-0:1.0.9-0.48.el3.x86_64", "3AS:seamonkey-dom-inspector-0:1.0.9-0.48.el3.i386", "3AS:seamonkey-dom-inspector-0:1.0.9-0.48.el3.ia64", "3AS:seamonkey-dom-inspector-0:1.0.9-0.48.el3.ppc", "3AS:seamonkey-dom-inspector-0:1.0.9-0.48.el3.s390", "3AS:seamonkey-dom-inspector-0:1.0.9-0.48.el3.s390x", "3AS:seamonkey-dom-inspector-0:1.0.9-0.48.el3.x86_64", "3AS:seamonkey-js-debugger-0:1.0.9-0.48.el3.i386", "3AS:seamonkey-js-debugger-0:1.0.9-0.48.el3.ia64", "3AS:seamonkey-js-debugger-0:1.0.9-0.48.el3.ppc", "3AS:seamonkey-js-debugger-0:1.0.9-0.48.el3.s390", "3AS:seamonkey-js-debugger-0:1.0.9-0.48.el3.s390x", "3AS:seamonkey-js-debugger-0:1.0.9-0.48.el3.x86_64", "3AS:seamonkey-mail-0:1.0.9-0.48.el3.i386", "3AS:seamonkey-mail-0:1.0.9-0.48.el3.ia64", "3AS:seamonkey-mail-0:1.0.9-0.48.el3.ppc", "3AS:seamonkey-mail-0:1.0.9-0.48.el3.s390", "3AS:seamonkey-mail-0:1.0.9-0.48.el3.s390x", "3AS:seamonkey-mail-0:1.0.9-0.48.el3.x86_64", "3AS:seamonkey-nspr-0:1.0.9-0.48.el3.i386", "3AS:seamonkey-nspr-0:1.0.9-0.48.el3.ia64", "3AS:seamonkey-nspr-0:1.0.9-0.48.el3.ppc", "3AS:seamonkey-nspr-0:1.0.9-0.48.el3.s390", "3AS:seamonkey-nspr-0:1.0.9-0.48.el3.s390x", "3AS:seamonkey-nspr-0:1.0.9-0.48.el3.x86_64", "3AS:seamonkey-nspr-devel-0:1.0.9-0.48.el3.i386", "3AS:seamonkey-nspr-devel-0:1.0.9-0.48.el3.ia64", "3AS:seamonkey-nspr-devel-0:1.0.9-0.48.el3.ppc", "3AS:seamonkey-nspr-devel-0:1.0.9-0.48.el3.s390", "3AS:seamonkey-nspr-devel-0:1.0.9-0.48.el3.s390x", "3AS:seamonkey-nspr-devel-0:1.0.9-0.48.el3.x86_64", "3AS:seamonkey-nss-0:1.0.9-0.48.el3.i386", "3AS:seamonkey-nss-0:1.0.9-0.48.el3.ia64", "3AS:seamonkey-nss-0:1.0.9-0.48.el3.ppc", "3AS:seamonkey-nss-0:1.0.9-0.48.el3.s390", "3AS:seamonkey-nss-0:1.0.9-0.48.el3.s390x", "3AS:seamonkey-nss-0:1.0.9-0.48.el3.x86_64", "3AS:seamonkey-nss-devel-0:1.0.9-0.48.el3.i386", "3AS:seamonkey-nss-devel-0:1.0.9-0.48.el3.ia64", "3AS:seamonkey-nss-devel-0:1.0.9-0.48.el3.ppc", "3AS:seamonkey-nss-devel-0:1.0.9-0.48.el3.s390", "3AS:seamonkey-nss-devel-0:1.0.9-0.48.el3.s390x", "3AS:seamonkey-nss-devel-0:1.0.9-0.48.el3.x86_64", "3Desktop:seamonkey-0:1.0.9-0.48.el3.i386", "3Desktop:seamonkey-0:1.0.9-0.48.el3.ia64", "3Desktop:seamonkey-0:1.0.9-0.48.el3.ppc", "3Desktop:seamonkey-0:1.0.9-0.48.el3.s390", "3Desktop:seamonkey-0:1.0.9-0.48.el3.s390x", "3Desktop:seamonkey-0:1.0.9-0.48.el3.src", "3Desktop:seamonkey-0:1.0.9-0.48.el3.x86_64", "3Desktop:seamonkey-chat-0:1.0.9-0.48.el3.i386", "3Desktop:seamonkey-chat-0:1.0.9-0.48.el3.ia64", "3Desktop:seamonkey-chat-0:1.0.9-0.48.el3.ppc", "3Desktop:seamonkey-chat-0:1.0.9-0.48.el3.s390", "3Desktop:seamonkey-chat-0:1.0.9-0.48.el3.s390x", "3Desktop:seamonkey-chat-0:1.0.9-0.48.el3.x86_64", "3Desktop:seamonkey-debuginfo-0:1.0.9-0.48.el3.i386", "3Desktop:seamonkey-debuginfo-0:1.0.9-0.48.el3.ia64", "3Desktop:seamonkey-debuginfo-0:1.0.9-0.48.el3.ppc", "3Desktop:seamonkey-debuginfo-0:1.0.9-0.48.el3.s390", "3Desktop:seamonkey-debuginfo-0:1.0.9-0.48.el3.s390x", "3Desktop:seamonkey-debuginfo-0:1.0.9-0.48.el3.x86_64", "3Desktop:seamonkey-devel-0:1.0.9-0.48.el3.i386", "3Desktop:seamonkey-devel-0:1.0.9-0.48.el3.ia64", "3Desktop:seamonkey-devel-0:1.0.9-0.48.el3.ppc", "3Desktop:seamonkey-devel-0:1.0.9-0.48.el3.s390", "3Desktop:seamonkey-devel-0:1.0.9-0.48.el3.s390x", "3Desktop:seamonkey-devel-0:1.0.9-0.48.el3.x86_64", "3Desktop:seamonkey-dom-inspector-0:1.0.9-0.48.el3.i386", "3Desktop:seamonkey-dom-inspector-0:1.0.9-0.48.el3.ia64", "3Desktop:seamonkey-dom-inspector-0:1.0.9-0.48.el3.ppc", "3Desktop:seamonkey-dom-inspector-0:1.0.9-0.48.el3.s390", "3Desktop:seamonkey-dom-inspector-0:1.0.9-0.48.el3.s390x", "3Desktop:seamonkey-dom-inspector-0:1.0.9-0.48.el3.x86_64", "3Desktop:seamonkey-js-debugger-0:1.0.9-0.48.el3.i386", "3Desktop:seamonkey-js-debugger-0:1.0.9-0.48.el3.ia64", "3Desktop:seamonkey-js-debugger-0:1.0.9-0.48.el3.ppc", "3Desktop:seamonkey-js-debugger-0:1.0.9-0.48.el3.s390", "3Desktop:seamonkey-js-debugger-0:1.0.9-0.48.el3.s390x", "3Desktop:seamonkey-js-debugger-0:1.0.9-0.48.el3.x86_64", "3Desktop:seamonkey-mail-0:1.0.9-0.48.el3.i386", "3Desktop:seamonkey-mail-0:1.0.9-0.48.el3.ia64", "3Desktop:seamonkey-mail-0:1.0.9-0.48.el3.ppc", "3Desktop:seamonkey-mail-0:1.0.9-0.48.el3.s390", "3Desktop:seamonkey-mail-0:1.0.9-0.48.el3.s390x", "3Desktop:seamonkey-mail-0:1.0.9-0.48.el3.x86_64", "3Desktop:seamonkey-nspr-0:1.0.9-0.48.el3.i386", "3Desktop:seamonkey-nspr-0:1.0.9-0.48.el3.ia64", "3Desktop:seamonkey-nspr-0:1.0.9-0.48.el3.ppc", "3Desktop:seamonkey-nspr-0:1.0.9-0.48.el3.s390", "3Desktop:seamonkey-nspr-0:1.0.9-0.48.el3.s390x", "3Desktop:seamonkey-nspr-0:1.0.9-0.48.el3.x86_64", "3Desktop:seamonkey-nspr-devel-0:1.0.9-0.48.el3.i386", "3Desktop:seamonkey-nspr-devel-0:1.0.9-0.48.el3.ia64", "3Desktop:seamonkey-nspr-devel-0:1.0.9-0.48.el3.ppc", "3Desktop:seamonkey-nspr-devel-0:1.0.9-0.48.el3.s390", "3Desktop:seamonkey-nspr-devel-0:1.0.9-0.48.el3.s390x", "3Desktop:seamonkey-nspr-devel-0:1.0.9-0.48.el3.x86_64", "3Desktop:seamonkey-nss-0:1.0.9-0.48.el3.i386", "3Desktop:seamonkey-nss-0:1.0.9-0.48.el3.ia64", "3Desktop:seamonkey-nss-0:1.0.9-0.48.el3.ppc", "3Desktop:seamonkey-nss-0:1.0.9-0.48.el3.s390", "3Desktop:seamonkey-nss-0:1.0.9-0.48.el3.s390x", "3Desktop:seamonkey-nss-0:1.0.9-0.48.el3.x86_64", "3Desktop:seamonkey-nss-devel-0:1.0.9-0.48.el3.i386", "3Desktop:seamonkey-nss-devel-0:1.0.9-0.48.el3.ia64", "3Desktop:seamonkey-nss-devel-0:1.0.9-0.48.el3.ppc", "3Desktop:seamonkey-nss-devel-0:1.0.9-0.48.el3.s390", "3Desktop:seamonkey-nss-devel-0:1.0.9-0.48.el3.s390x", "3Desktop:seamonkey-nss-devel-0:1.0.9-0.48.el3.x86_64", "3ES:seamonkey-0:1.0.9-0.48.el3.i386", "3ES:seamonkey-0:1.0.9-0.48.el3.ia64", "3ES:seamonkey-0:1.0.9-0.48.el3.ppc", "3ES:seamonkey-0:1.0.9-0.48.el3.s390", "3ES:seamonkey-0:1.0.9-0.48.el3.s390x", "3ES:seamonkey-0:1.0.9-0.48.el3.src", "3ES:seamonkey-0:1.0.9-0.48.el3.x86_64", "3ES:seamonkey-chat-0:1.0.9-0.48.el3.i386", "3ES:seamonkey-chat-0:1.0.9-0.48.el3.ia64", "3ES:seamonkey-chat-0:1.0.9-0.48.el3.ppc", "3ES:seamonkey-chat-0:1.0.9-0.48.el3.s390", "3ES:seamonkey-chat-0:1.0.9-0.48.el3.s390x", "3ES:seamonkey-chat-0:1.0.9-0.48.el3.x86_64", "3ES:seamonkey-debuginfo-0:1.0.9-0.48.el3.i386", "3ES:seamonkey-debuginfo-0:1.0.9-0.48.el3.ia64", "3ES:seamonkey-debuginfo-0:1.0.9-0.48.el3.ppc", "3ES:seamonkey-debuginfo-0:1.0.9-0.48.el3.s390", "3ES:seamonkey-debuginfo-0:1.0.9-0.48.el3.s390x", "3ES:seamonkey-debuginfo-0:1.0.9-0.48.el3.x86_64", "3ES:seamonkey-devel-0:1.0.9-0.48.el3.i386", "3ES:seamonkey-devel-0:1.0.9-0.48.el3.ia64", "3ES:seamonkey-devel-0:1.0.9-0.48.el3.ppc", "3ES:seamonkey-devel-0:1.0.9-0.48.el3.s390", "3ES:seamonkey-devel-0:1.0.9-0.48.el3.s390x", "3ES:seamonkey-devel-0:1.0.9-0.48.el3.x86_64", "3ES:seamonkey-dom-inspector-0:1.0.9-0.48.el3.i386", "3ES:seamonkey-dom-inspector-0:1.0.9-0.48.el3.ia64", "3ES:seamonkey-dom-inspector-0:1.0.9-0.48.el3.ppc", "3ES:seamonkey-dom-inspector-0:1.0.9-0.48.el3.s390", "3ES:seamonkey-dom-inspector-0:1.0.9-0.48.el3.s390x", "3ES:seamonkey-dom-inspector-0:1.0.9-0.48.el3.x86_64", "3ES:seamonkey-js-debugger-0:1.0.9-0.48.el3.i386", "3ES:seamonkey-js-debugger-0:1.0.9-0.48.el3.ia64", "3ES:seamonkey-js-debugger-0:1.0.9-0.48.el3.ppc", "3ES:seamonkey-js-debugger-0:1.0.9-0.48.el3.s390", "3ES:seamonkey-js-debugger-0:1.0.9-0.48.el3.s390x", "3ES:seamonkey-js-debugger-0:1.0.9-0.48.el3.x86_64", "3ES:seamonkey-mail-0:1.0.9-0.48.el3.i386", "3ES:seamonkey-mail-0:1.0.9-0.48.el3.ia64", "3ES:seamonkey-mail-0:1.0.9-0.48.el3.ppc", "3ES:seamonkey-mail-0:1.0.9-0.48.el3.s390", "3ES:seamonkey-mail-0:1.0.9-0.48.el3.s390x", "3ES:seamonkey-mail-0:1.0.9-0.48.el3.x86_64", "3ES:seamonkey-nspr-0:1.0.9-0.48.el3.i386", "3ES:seamonkey-nspr-0:1.0.9-0.48.el3.ia64", "3ES:seamonkey-nspr-0:1.0.9-0.48.el3.ppc", "3ES:seamonkey-nspr-0:1.0.9-0.48.el3.s390", "3ES:seamonkey-nspr-0:1.0.9-0.48.el3.s390x", "3ES:seamonkey-nspr-0:1.0.9-0.48.el3.x86_64", "3ES:seamonkey-nspr-devel-0:1.0.9-0.48.el3.i386", "3ES:seamonkey-nspr-devel-0:1.0.9-0.48.el3.ia64", "3ES:seamonkey-nspr-devel-0:1.0.9-0.48.el3.ppc", "3ES:seamonkey-nspr-devel-0:1.0.9-0.48.el3.s390", "3ES:seamonkey-nspr-devel-0:1.0.9-0.48.el3.s390x", "3ES:seamonkey-nspr-devel-0:1.0.9-0.48.el3.x86_64", "3ES:seamonkey-nss-0:1.0.9-0.48.el3.i386", "3ES:seamonkey-nss-0:1.0.9-0.48.el3.ia64", "3ES:seamonkey-nss-0:1.0.9-0.48.el3.ppc", "3ES:seamonkey-nss-0:1.0.9-0.48.el3.s390", "3ES:seamonkey-nss-0:1.0.9-0.48.el3.s390x", "3ES:seamonkey-nss-0:1.0.9-0.48.el3.x86_64", "3ES:seamonkey-nss-devel-0:1.0.9-0.48.el3.i386", "3ES:seamonkey-nss-devel-0:1.0.9-0.48.el3.ia64", "3ES:seamonkey-nss-devel-0:1.0.9-0.48.el3.ppc", "3ES:seamonkey-nss-devel-0:1.0.9-0.48.el3.s390", "3ES:seamonkey-nss-devel-0:1.0.9-0.48.el3.s390x", "3ES:seamonkey-nss-devel-0:1.0.9-0.48.el3.x86_64", "3WS:seamonkey-0:1.0.9-0.48.el3.i386", "3WS:seamonkey-0:1.0.9-0.48.el3.ia64", "3WS:seamonkey-0:1.0.9-0.48.el3.ppc", "3WS:seamonkey-0:1.0.9-0.48.el3.s390", "3WS:seamonkey-0:1.0.9-0.48.el3.s390x", "3WS:seamonkey-0:1.0.9-0.48.el3.src", "3WS:seamonkey-0:1.0.9-0.48.el3.x86_64", "3WS:seamonkey-chat-0:1.0.9-0.48.el3.i386", "3WS:seamonkey-chat-0:1.0.9-0.48.el3.ia64", "3WS:seamonkey-chat-0:1.0.9-0.48.el3.ppc", "3WS:seamonkey-chat-0:1.0.9-0.48.el3.s390", "3WS:seamonkey-chat-0:1.0.9-0.48.el3.s390x", "3WS:seamonkey-chat-0:1.0.9-0.48.el3.x86_64", "3WS:seamonkey-debuginfo-0:1.0.9-0.48.el3.i386", "3WS:seamonkey-debuginfo-0:1.0.9-0.48.el3.ia64", "3WS:seamonkey-debuginfo-0:1.0.9-0.48.el3.ppc", "3WS:seamonkey-debuginfo-0:1.0.9-0.48.el3.s390", "3WS:seamonkey-debuginfo-0:1.0.9-0.48.el3.s390x", "3WS:seamonkey-debuginfo-0:1.0.9-0.48.el3.x86_64", "3WS:seamonkey-devel-0:1.0.9-0.48.el3.i386", "3WS:seamonkey-devel-0:1.0.9-0.48.el3.ia64", "3WS:seamonkey-devel-0:1.0.9-0.48.el3.ppc", "3WS:seamonkey-devel-0:1.0.9-0.48.el3.s390", "3WS:seamonkey-devel-0:1.0.9-0.48.el3.s390x", "3WS:seamonkey-devel-0:1.0.9-0.48.el3.x86_64", "3WS:seamonkey-dom-inspector-0:1.0.9-0.48.el3.i386", "3WS:seamonkey-dom-inspector-0:1.0.9-0.48.el3.ia64", "3WS:seamonkey-dom-inspector-0:1.0.9-0.48.el3.ppc", "3WS:seamonkey-dom-inspector-0:1.0.9-0.48.el3.s390", "3WS:seamonkey-dom-inspector-0:1.0.9-0.48.el3.s390x", "3WS:seamonkey-dom-inspector-0:1.0.9-0.48.el3.x86_64", "3WS:seamonkey-js-debugger-0:1.0.9-0.48.el3.i386", "3WS:seamonkey-js-debugger-0:1.0.9-0.48.el3.ia64", "3WS:seamonkey-js-debugger-0:1.0.9-0.48.el3.ppc", "3WS:seamonkey-js-debugger-0:1.0.9-0.48.el3.s390", "3WS:seamonkey-js-debugger-0:1.0.9-0.48.el3.s390x", "3WS:seamonkey-js-debugger-0:1.0.9-0.48.el3.x86_64", "3WS:seamonkey-mail-0:1.0.9-0.48.el3.i386", "3WS:seamonkey-mail-0:1.0.9-0.48.el3.ia64", "3WS:seamonkey-mail-0:1.0.9-0.48.el3.ppc", "3WS:seamonkey-mail-0:1.0.9-0.48.el3.s390", "3WS:seamonkey-mail-0:1.0.9-0.48.el3.s390x", "3WS:seamonkey-mail-0:1.0.9-0.48.el3.x86_64", "3WS:seamonkey-nspr-0:1.0.9-0.48.el3.i386", "3WS:seamonkey-nspr-0:1.0.9-0.48.el3.ia64", "3WS:seamonkey-nspr-0:1.0.9-0.48.el3.ppc", "3WS:seamonkey-nspr-0:1.0.9-0.48.el3.s390", "3WS:seamonkey-nspr-0:1.0.9-0.48.el3.s390x", "3WS:seamonkey-nspr-0:1.0.9-0.48.el3.x86_64", "3WS:seamonkey-nspr-devel-0:1.0.9-0.48.el3.i386", "3WS:seamonkey-nspr-devel-0:1.0.9-0.48.el3.ia64", "3WS:seamonkey-nspr-devel-0:1.0.9-0.48.el3.ppc", "3WS:seamonkey-nspr-devel-0:1.0.9-0.48.el3.s390", "3WS:seamonkey-nspr-devel-0:1.0.9-0.48.el3.s390x", "3WS:seamonkey-nspr-devel-0:1.0.9-0.48.el3.x86_64", "3WS:seamonkey-nss-0:1.0.9-0.48.el3.i386", "3WS:seamonkey-nss-0:1.0.9-0.48.el3.ia64", "3WS:seamonkey-nss-0:1.0.9-0.48.el3.ppc", "3WS:seamonkey-nss-0:1.0.9-0.48.el3.s390", "3WS:seamonkey-nss-0:1.0.9-0.48.el3.s390x", "3WS:seamonkey-nss-0:1.0.9-0.48.el3.x86_64", "3WS:seamonkey-nss-devel-0:1.0.9-0.48.el3.i386", "3WS:seamonkey-nss-devel-0:1.0.9-0.48.el3.ia64", "3WS:seamonkey-nss-devel-0:1.0.9-0.48.el3.ppc", "3WS:seamonkey-nss-devel-0:1.0.9-0.48.el3.s390", "3WS:seamonkey-nss-devel-0:1.0.9-0.48.el3.s390x", "3WS:seamonkey-nss-devel-0:1.0.9-0.48.el3.x86_64", "4AS:seamonkey-0:1.0.9-51.el4_8.i386", "4AS:seamonkey-0:1.0.9-51.el4_8.ia64", "4AS:seamonkey-0:1.0.9-51.el4_8.ppc", "4AS:seamonkey-0:1.0.9-51.el4_8.s390", "4AS:seamonkey-0:1.0.9-51.el4_8.s390x", "4AS:seamonkey-0:1.0.9-51.el4_8.src", "4AS:seamonkey-0:1.0.9-51.el4_8.x86_64", "4AS:seamonkey-chat-0:1.0.9-51.el4_8.i386", "4AS:seamonkey-chat-0:1.0.9-51.el4_8.ia64", "4AS:seamonkey-chat-0:1.0.9-51.el4_8.ppc", "4AS:seamonkey-chat-0:1.0.9-51.el4_8.s390", "4AS:seamonkey-chat-0:1.0.9-51.el4_8.s390x", "4AS:seamonkey-chat-0:1.0.9-51.el4_8.x86_64", "4AS:seamonkey-debuginfo-0:1.0.9-51.el4_8.i386", "4AS:seamonkey-debuginfo-0:1.0.9-51.el4_8.ia64", "4AS:seamonkey-debuginfo-0:1.0.9-51.el4_8.ppc", "4AS:seamonkey-debuginfo-0:1.0.9-51.el4_8.s390", "4AS:seamonkey-debuginfo-0:1.0.9-51.el4_8.s390x", "4AS:seamonkey-debuginfo-0:1.0.9-51.el4_8.x86_64", "4AS:seamonkey-devel-0:1.0.9-51.el4_8.i386", "4AS:seamonkey-devel-0:1.0.9-51.el4_8.ia64", "4AS:seamonkey-devel-0:1.0.9-51.el4_8.ppc", "4AS:seamonkey-devel-0:1.0.9-51.el4_8.s390", "4AS:seamonkey-devel-0:1.0.9-51.el4_8.s390x", "4AS:seamonkey-devel-0:1.0.9-51.el4_8.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.9-51.el4_8.i386", "4AS:seamonkey-dom-inspector-0:1.0.9-51.el4_8.ia64", "4AS:seamonkey-dom-inspector-0:1.0.9-51.el4_8.ppc", "4AS:seamonkey-dom-inspector-0:1.0.9-51.el4_8.s390", "4AS:seamonkey-dom-inspector-0:1.0.9-51.el4_8.s390x", "4AS:seamonkey-dom-inspector-0:1.0.9-51.el4_8.x86_64", "4AS:seamonkey-js-debugger-0:1.0.9-51.el4_8.i386", "4AS:seamonkey-js-debugger-0:1.0.9-51.el4_8.ia64", "4AS:seamonkey-js-debugger-0:1.0.9-51.el4_8.ppc", "4AS:seamonkey-js-debugger-0:1.0.9-51.el4_8.s390", "4AS:seamonkey-js-debugger-0:1.0.9-51.el4_8.s390x", "4AS:seamonkey-js-debugger-0:1.0.9-51.el4_8.x86_64", "4AS:seamonkey-mail-0:1.0.9-51.el4_8.i386", "4AS:seamonkey-mail-0:1.0.9-51.el4_8.ia64", "4AS:seamonkey-mail-0:1.0.9-51.el4_8.ppc", "4AS:seamonkey-mail-0:1.0.9-51.el4_8.s390", "4AS:seamonkey-mail-0:1.0.9-51.el4_8.s390x", "4AS:seamonkey-mail-0:1.0.9-51.el4_8.x86_64", "4Desktop:seamonkey-0:1.0.9-51.el4_8.i386", "4Desktop:seamonkey-0:1.0.9-51.el4_8.ia64", "4Desktop:seamonkey-0:1.0.9-51.el4_8.ppc", "4Desktop:seamonkey-0:1.0.9-51.el4_8.s390", "4Desktop:seamonkey-0:1.0.9-51.el4_8.s390x", "4Desktop:seamonkey-0:1.0.9-51.el4_8.src", "4Desktop:seamonkey-0:1.0.9-51.el4_8.x86_64", "4Desktop:seamonkey-chat-0:1.0.9-51.el4_8.i386", "4Desktop:seamonkey-chat-0:1.0.9-51.el4_8.ia64", "4Desktop:seamonkey-chat-0:1.0.9-51.el4_8.ppc", "4Desktop:seamonkey-chat-0:1.0.9-51.el4_8.s390", "4Desktop:seamonkey-chat-0:1.0.9-51.el4_8.s390x", "4Desktop:seamonkey-chat-0:1.0.9-51.el4_8.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.9-51.el4_8.i386", "4Desktop:seamonkey-debuginfo-0:1.0.9-51.el4_8.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.9-51.el4_8.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.9-51.el4_8.s390", "4Desktop:seamonkey-debuginfo-0:1.0.9-51.el4_8.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.9-51.el4_8.x86_64", "4Desktop:seamonkey-devel-0:1.0.9-51.el4_8.i386", "4Desktop:seamonkey-devel-0:1.0.9-51.el4_8.ia64", "4Desktop:seamonkey-devel-0:1.0.9-51.el4_8.ppc", "4Desktop:seamonkey-devel-0:1.0.9-51.el4_8.s390", "4Desktop:seamonkey-devel-0:1.0.9-51.el4_8.s390x", "4Desktop:seamonkey-devel-0:1.0.9-51.el4_8.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.9-51.el4_8.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.9-51.el4_8.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.9-51.el4_8.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.9-51.el4_8.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.9-51.el4_8.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.9-51.el4_8.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.9-51.el4_8.i386", "4Desktop:seamonkey-js-debugger-0:1.0.9-51.el4_8.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.9-51.el4_8.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.9-51.el4_8.s390", "4Desktop:seamonkey-js-debugger-0:1.0.9-51.el4_8.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.9-51.el4_8.x86_64", "4Desktop:seamonkey-mail-0:1.0.9-51.el4_8.i386", "4Desktop:seamonkey-mail-0:1.0.9-51.el4_8.ia64", "4Desktop:seamonkey-mail-0:1.0.9-51.el4_8.ppc", "4Desktop:seamonkey-mail-0:1.0.9-51.el4_8.s390", "4Desktop:seamonkey-mail-0:1.0.9-51.el4_8.s390x", "4Desktop:seamonkey-mail-0:1.0.9-51.el4_8.x86_64", "4ES:seamonkey-0:1.0.9-51.el4_8.i386", "4ES:seamonkey-0:1.0.9-51.el4_8.ia64", "4ES:seamonkey-0:1.0.9-51.el4_8.ppc", "4ES:seamonkey-0:1.0.9-51.el4_8.s390", "4ES:seamonkey-0:1.0.9-51.el4_8.s390x", "4ES:seamonkey-0:1.0.9-51.el4_8.src", "4ES:seamonkey-0:1.0.9-51.el4_8.x86_64", "4ES:seamonkey-chat-0:1.0.9-51.el4_8.i386", "4ES:seamonkey-chat-0:1.0.9-51.el4_8.ia64", "4ES:seamonkey-chat-0:1.0.9-51.el4_8.ppc", "4ES:seamonkey-chat-0:1.0.9-51.el4_8.s390", "4ES:seamonkey-chat-0:1.0.9-51.el4_8.s390x", "4ES:seamonkey-chat-0:1.0.9-51.el4_8.x86_64", "4ES:seamonkey-debuginfo-0:1.0.9-51.el4_8.i386", "4ES:seamonkey-debuginfo-0:1.0.9-51.el4_8.ia64", "4ES:seamonkey-debuginfo-0:1.0.9-51.el4_8.ppc", "4ES:seamonkey-debuginfo-0:1.0.9-51.el4_8.s390", "4ES:seamonkey-debuginfo-0:1.0.9-51.el4_8.s390x", "4ES:seamonkey-debuginfo-0:1.0.9-51.el4_8.x86_64", "4ES:seamonkey-devel-0:1.0.9-51.el4_8.i386", "4ES:seamonkey-devel-0:1.0.9-51.el4_8.ia64", "4ES:seamonkey-devel-0:1.0.9-51.el4_8.ppc", "4ES:seamonkey-devel-0:1.0.9-51.el4_8.s390", "4ES:seamonkey-devel-0:1.0.9-51.el4_8.s390x", "4ES:seamonkey-devel-0:1.0.9-51.el4_8.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.9-51.el4_8.i386", "4ES:seamonkey-dom-inspector-0:1.0.9-51.el4_8.ia64", "4ES:seamonkey-dom-inspector-0:1.0.9-51.el4_8.ppc", "4ES:seamonkey-dom-inspector-0:1.0.9-51.el4_8.s390", "4ES:seamonkey-dom-inspector-0:1.0.9-51.el4_8.s390x", "4ES:seamonkey-dom-inspector-0:1.0.9-51.el4_8.x86_64", "4ES:seamonkey-js-debugger-0:1.0.9-51.el4_8.i386", "4ES:seamonkey-js-debugger-0:1.0.9-51.el4_8.ia64", "4ES:seamonkey-js-debugger-0:1.0.9-51.el4_8.ppc", "4ES:seamonkey-js-debugger-0:1.0.9-51.el4_8.s390", "4ES:seamonkey-js-debugger-0:1.0.9-51.el4_8.s390x", "4ES:seamonkey-js-debugger-0:1.0.9-51.el4_8.x86_64", "4ES:seamonkey-mail-0:1.0.9-51.el4_8.i386", "4ES:seamonkey-mail-0:1.0.9-51.el4_8.ia64", "4ES:seamonkey-mail-0:1.0.9-51.el4_8.ppc", "4ES:seamonkey-mail-0:1.0.9-51.el4_8.s390", "4ES:seamonkey-mail-0:1.0.9-51.el4_8.s390x", "4ES:seamonkey-mail-0:1.0.9-51.el4_8.x86_64", "4WS:seamonkey-0:1.0.9-51.el4_8.i386", "4WS:seamonkey-0:1.0.9-51.el4_8.ia64", "4WS:seamonkey-0:1.0.9-51.el4_8.ppc", "4WS:seamonkey-0:1.0.9-51.el4_8.s390", "4WS:seamonkey-0:1.0.9-51.el4_8.s390x", "4WS:seamonkey-0:1.0.9-51.el4_8.src", "4WS:seamonkey-0:1.0.9-51.el4_8.x86_64", "4WS:seamonkey-chat-0:1.0.9-51.el4_8.i386", "4WS:seamonkey-chat-0:1.0.9-51.el4_8.ia64", "4WS:seamonkey-chat-0:1.0.9-51.el4_8.ppc", "4WS:seamonkey-chat-0:1.0.9-51.el4_8.s390", "4WS:seamonkey-chat-0:1.0.9-51.el4_8.s390x", "4WS:seamonkey-chat-0:1.0.9-51.el4_8.x86_64", "4WS:seamonkey-debuginfo-0:1.0.9-51.el4_8.i386", "4WS:seamonkey-debuginfo-0:1.0.9-51.el4_8.ia64", "4WS:seamonkey-debuginfo-0:1.0.9-51.el4_8.ppc", "4WS:seamonkey-debuginfo-0:1.0.9-51.el4_8.s390", "4WS:seamonkey-debuginfo-0:1.0.9-51.el4_8.s390x", "4WS:seamonkey-debuginfo-0:1.0.9-51.el4_8.x86_64", "4WS:seamonkey-devel-0:1.0.9-51.el4_8.i386", "4WS:seamonkey-devel-0:1.0.9-51.el4_8.ia64", "4WS:seamonkey-devel-0:1.0.9-51.el4_8.ppc", "4WS:seamonkey-devel-0:1.0.9-51.el4_8.s390", "4WS:seamonkey-devel-0:1.0.9-51.el4_8.s390x", "4WS:seamonkey-devel-0:1.0.9-51.el4_8.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.9-51.el4_8.i386", "4WS:seamonkey-dom-inspector-0:1.0.9-51.el4_8.ia64", "4WS:seamonkey-dom-inspector-0:1.0.9-51.el4_8.ppc", "4WS:seamonkey-dom-inspector-0:1.0.9-51.el4_8.s390", "4WS:seamonkey-dom-inspector-0:1.0.9-51.el4_8.s390x", "4WS:seamonkey-dom-inspector-0:1.0.9-51.el4_8.x86_64", "4WS:seamonkey-js-debugger-0:1.0.9-51.el4_8.i386", "4WS:seamonkey-js-debugger-0:1.0.9-51.el4_8.ia64", "4WS:seamonkey-js-debugger-0:1.0.9-51.el4_8.ppc", "4WS:seamonkey-js-debugger-0:1.0.9-51.el4_8.s390", "4WS:seamonkey-js-debugger-0:1.0.9-51.el4_8.s390x", "4WS:seamonkey-js-debugger-0:1.0.9-51.el4_8.x86_64", "4WS:seamonkey-mail-0:1.0.9-51.el4_8.i386", "4WS:seamonkey-mail-0:1.0.9-51.el4_8.ia64", "4WS:seamonkey-mail-0:1.0.9-51.el4_8.ppc", "4WS:seamonkey-mail-0:1.0.9-51.el4_8.s390", "4WS:seamonkey-mail-0:1.0.9-51.el4_8.s390x", "4WS:seamonkey-mail-0:1.0.9-51.el4_8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-3983" }, { "category": "external", "summary": "RHBZ#546720", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=546720" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3983", "url": "https://www.cve.org/CVERecord?id=CVE-2009-3983" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3983", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3983" } ], "release_date": "2009-12-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-12-16T04:33:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "3AS:seamonkey-0:1.0.9-0.48.el3.i386", "3AS:seamonkey-0:1.0.9-0.48.el3.ia64", "3AS:seamonkey-0:1.0.9-0.48.el3.ppc", "3AS:seamonkey-0:1.0.9-0.48.el3.s390", "3AS:seamonkey-0:1.0.9-0.48.el3.s390x", "3AS:seamonkey-0:1.0.9-0.48.el3.src", "3AS:seamonkey-0:1.0.9-0.48.el3.x86_64", "3AS:seamonkey-chat-0:1.0.9-0.48.el3.i386", "3AS:seamonkey-chat-0:1.0.9-0.48.el3.ia64", "3AS:seamonkey-chat-0:1.0.9-0.48.el3.ppc", "3AS:seamonkey-chat-0:1.0.9-0.48.el3.s390", "3AS:seamonkey-chat-0:1.0.9-0.48.el3.s390x", "3AS:seamonkey-chat-0:1.0.9-0.48.el3.x86_64", "3AS:seamonkey-debuginfo-0:1.0.9-0.48.el3.i386", "3AS:seamonkey-debuginfo-0:1.0.9-0.48.el3.ia64", "3AS:seamonkey-debuginfo-0:1.0.9-0.48.el3.ppc", "3AS:seamonkey-debuginfo-0:1.0.9-0.48.el3.s390", "3AS:seamonkey-debuginfo-0:1.0.9-0.48.el3.s390x", "3AS:seamonkey-debuginfo-0:1.0.9-0.48.el3.x86_64", "3AS:seamonkey-devel-0:1.0.9-0.48.el3.i386", "3AS:seamonkey-devel-0:1.0.9-0.48.el3.ia64", "3AS:seamonkey-devel-0:1.0.9-0.48.el3.ppc", "3AS:seamonkey-devel-0:1.0.9-0.48.el3.s390", "3AS:seamonkey-devel-0:1.0.9-0.48.el3.s390x", "3AS:seamonkey-devel-0:1.0.9-0.48.el3.x86_64", "3AS:seamonkey-dom-inspector-0:1.0.9-0.48.el3.i386", "3AS:seamonkey-dom-inspector-0:1.0.9-0.48.el3.ia64", "3AS:seamonkey-dom-inspector-0:1.0.9-0.48.el3.ppc", "3AS:seamonkey-dom-inspector-0:1.0.9-0.48.el3.s390", "3AS:seamonkey-dom-inspector-0:1.0.9-0.48.el3.s390x", "3AS:seamonkey-dom-inspector-0:1.0.9-0.48.el3.x86_64", "3AS:seamonkey-js-debugger-0:1.0.9-0.48.el3.i386", "3AS:seamonkey-js-debugger-0:1.0.9-0.48.el3.ia64", "3AS:seamonkey-js-debugger-0:1.0.9-0.48.el3.ppc", "3AS:seamonkey-js-debugger-0:1.0.9-0.48.el3.s390", "3AS:seamonkey-js-debugger-0:1.0.9-0.48.el3.s390x", "3AS:seamonkey-js-debugger-0:1.0.9-0.48.el3.x86_64", "3AS:seamonkey-mail-0:1.0.9-0.48.el3.i386", "3AS:seamonkey-mail-0:1.0.9-0.48.el3.ia64", "3AS:seamonkey-mail-0:1.0.9-0.48.el3.ppc", "3AS:seamonkey-mail-0:1.0.9-0.48.el3.s390", "3AS:seamonkey-mail-0:1.0.9-0.48.el3.s390x", "3AS:seamonkey-mail-0:1.0.9-0.48.el3.x86_64", "3AS:seamonkey-nspr-0:1.0.9-0.48.el3.i386", "3AS:seamonkey-nspr-0:1.0.9-0.48.el3.ia64", "3AS:seamonkey-nspr-0:1.0.9-0.48.el3.ppc", "3AS:seamonkey-nspr-0:1.0.9-0.48.el3.s390", "3AS:seamonkey-nspr-0:1.0.9-0.48.el3.s390x", "3AS:seamonkey-nspr-0:1.0.9-0.48.el3.x86_64", "3AS:seamonkey-nspr-devel-0:1.0.9-0.48.el3.i386", "3AS:seamonkey-nspr-devel-0:1.0.9-0.48.el3.ia64", "3AS:seamonkey-nspr-devel-0:1.0.9-0.48.el3.ppc", "3AS:seamonkey-nspr-devel-0:1.0.9-0.48.el3.s390", "3AS:seamonkey-nspr-devel-0:1.0.9-0.48.el3.s390x", "3AS:seamonkey-nspr-devel-0:1.0.9-0.48.el3.x86_64", "3AS:seamonkey-nss-0:1.0.9-0.48.el3.i386", "3AS:seamonkey-nss-0:1.0.9-0.48.el3.ia64", "3AS:seamonkey-nss-0:1.0.9-0.48.el3.ppc", "3AS:seamonkey-nss-0:1.0.9-0.48.el3.s390", "3AS:seamonkey-nss-0:1.0.9-0.48.el3.s390x", "3AS:seamonkey-nss-0:1.0.9-0.48.el3.x86_64", "3AS:seamonkey-nss-devel-0:1.0.9-0.48.el3.i386", "3AS:seamonkey-nss-devel-0:1.0.9-0.48.el3.ia64", "3AS:seamonkey-nss-devel-0:1.0.9-0.48.el3.ppc", "3AS:seamonkey-nss-devel-0:1.0.9-0.48.el3.s390", "3AS:seamonkey-nss-devel-0:1.0.9-0.48.el3.s390x", "3AS:seamonkey-nss-devel-0:1.0.9-0.48.el3.x86_64", "3Desktop:seamonkey-0:1.0.9-0.48.el3.i386", "3Desktop:seamonkey-0:1.0.9-0.48.el3.ia64", "3Desktop:seamonkey-0:1.0.9-0.48.el3.ppc", "3Desktop:seamonkey-0:1.0.9-0.48.el3.s390", "3Desktop:seamonkey-0:1.0.9-0.48.el3.s390x", "3Desktop:seamonkey-0:1.0.9-0.48.el3.src", "3Desktop:seamonkey-0:1.0.9-0.48.el3.x86_64", "3Desktop:seamonkey-chat-0:1.0.9-0.48.el3.i386", "3Desktop:seamonkey-chat-0:1.0.9-0.48.el3.ia64", "3Desktop:seamonkey-chat-0:1.0.9-0.48.el3.ppc", "3Desktop:seamonkey-chat-0:1.0.9-0.48.el3.s390", "3Desktop:seamonkey-chat-0:1.0.9-0.48.el3.s390x", "3Desktop:seamonkey-chat-0:1.0.9-0.48.el3.x86_64", "3Desktop:seamonkey-debuginfo-0:1.0.9-0.48.el3.i386", "3Desktop:seamonkey-debuginfo-0:1.0.9-0.48.el3.ia64", "3Desktop:seamonkey-debuginfo-0:1.0.9-0.48.el3.ppc", "3Desktop:seamonkey-debuginfo-0:1.0.9-0.48.el3.s390", "3Desktop:seamonkey-debuginfo-0:1.0.9-0.48.el3.s390x", "3Desktop:seamonkey-debuginfo-0:1.0.9-0.48.el3.x86_64", "3Desktop:seamonkey-devel-0:1.0.9-0.48.el3.i386", "3Desktop:seamonkey-devel-0:1.0.9-0.48.el3.ia64", "3Desktop:seamonkey-devel-0:1.0.9-0.48.el3.ppc", "3Desktop:seamonkey-devel-0:1.0.9-0.48.el3.s390", "3Desktop:seamonkey-devel-0:1.0.9-0.48.el3.s390x", "3Desktop:seamonkey-devel-0:1.0.9-0.48.el3.x86_64", "3Desktop:seamonkey-dom-inspector-0:1.0.9-0.48.el3.i386", "3Desktop:seamonkey-dom-inspector-0:1.0.9-0.48.el3.ia64", "3Desktop:seamonkey-dom-inspector-0:1.0.9-0.48.el3.ppc", "3Desktop:seamonkey-dom-inspector-0:1.0.9-0.48.el3.s390", "3Desktop:seamonkey-dom-inspector-0:1.0.9-0.48.el3.s390x", "3Desktop:seamonkey-dom-inspector-0:1.0.9-0.48.el3.x86_64", "3Desktop:seamonkey-js-debugger-0:1.0.9-0.48.el3.i386", "3Desktop:seamonkey-js-debugger-0:1.0.9-0.48.el3.ia64", "3Desktop:seamonkey-js-debugger-0:1.0.9-0.48.el3.ppc", "3Desktop:seamonkey-js-debugger-0:1.0.9-0.48.el3.s390", "3Desktop:seamonkey-js-debugger-0:1.0.9-0.48.el3.s390x", "3Desktop:seamonkey-js-debugger-0:1.0.9-0.48.el3.x86_64", "3Desktop:seamonkey-mail-0:1.0.9-0.48.el3.i386", "3Desktop:seamonkey-mail-0:1.0.9-0.48.el3.ia64", "3Desktop:seamonkey-mail-0:1.0.9-0.48.el3.ppc", "3Desktop:seamonkey-mail-0:1.0.9-0.48.el3.s390", "3Desktop:seamonkey-mail-0:1.0.9-0.48.el3.s390x", "3Desktop:seamonkey-mail-0:1.0.9-0.48.el3.x86_64", "3Desktop:seamonkey-nspr-0:1.0.9-0.48.el3.i386", "3Desktop:seamonkey-nspr-0:1.0.9-0.48.el3.ia64", "3Desktop:seamonkey-nspr-0:1.0.9-0.48.el3.ppc", "3Desktop:seamonkey-nspr-0:1.0.9-0.48.el3.s390", "3Desktop:seamonkey-nspr-0:1.0.9-0.48.el3.s390x", "3Desktop:seamonkey-nspr-0:1.0.9-0.48.el3.x86_64", "3Desktop:seamonkey-nspr-devel-0:1.0.9-0.48.el3.i386", "3Desktop:seamonkey-nspr-devel-0:1.0.9-0.48.el3.ia64", "3Desktop:seamonkey-nspr-devel-0:1.0.9-0.48.el3.ppc", "3Desktop:seamonkey-nspr-devel-0:1.0.9-0.48.el3.s390", "3Desktop:seamonkey-nspr-devel-0:1.0.9-0.48.el3.s390x", "3Desktop:seamonkey-nspr-devel-0:1.0.9-0.48.el3.x86_64", "3Desktop:seamonkey-nss-0:1.0.9-0.48.el3.i386", "3Desktop:seamonkey-nss-0:1.0.9-0.48.el3.ia64", "3Desktop:seamonkey-nss-0:1.0.9-0.48.el3.ppc", "3Desktop:seamonkey-nss-0:1.0.9-0.48.el3.s390", "3Desktop:seamonkey-nss-0:1.0.9-0.48.el3.s390x", "3Desktop:seamonkey-nss-0:1.0.9-0.48.el3.x86_64", "3Desktop:seamonkey-nss-devel-0:1.0.9-0.48.el3.i386", "3Desktop:seamonkey-nss-devel-0:1.0.9-0.48.el3.ia64", "3Desktop:seamonkey-nss-devel-0:1.0.9-0.48.el3.ppc", "3Desktop:seamonkey-nss-devel-0:1.0.9-0.48.el3.s390", "3Desktop:seamonkey-nss-devel-0:1.0.9-0.48.el3.s390x", "3Desktop:seamonkey-nss-devel-0:1.0.9-0.48.el3.x86_64", "3ES:seamonkey-0:1.0.9-0.48.el3.i386", "3ES:seamonkey-0:1.0.9-0.48.el3.ia64", "3ES:seamonkey-0:1.0.9-0.48.el3.ppc", "3ES:seamonkey-0:1.0.9-0.48.el3.s390", "3ES:seamonkey-0:1.0.9-0.48.el3.s390x", "3ES:seamonkey-0:1.0.9-0.48.el3.src", "3ES:seamonkey-0:1.0.9-0.48.el3.x86_64", "3ES:seamonkey-chat-0:1.0.9-0.48.el3.i386", "3ES:seamonkey-chat-0:1.0.9-0.48.el3.ia64", "3ES:seamonkey-chat-0:1.0.9-0.48.el3.ppc", "3ES:seamonkey-chat-0:1.0.9-0.48.el3.s390", "3ES:seamonkey-chat-0:1.0.9-0.48.el3.s390x", "3ES:seamonkey-chat-0:1.0.9-0.48.el3.x86_64", "3ES:seamonkey-debuginfo-0:1.0.9-0.48.el3.i386", "3ES:seamonkey-debuginfo-0:1.0.9-0.48.el3.ia64", "3ES:seamonkey-debuginfo-0:1.0.9-0.48.el3.ppc", "3ES:seamonkey-debuginfo-0:1.0.9-0.48.el3.s390", "3ES:seamonkey-debuginfo-0:1.0.9-0.48.el3.s390x", "3ES:seamonkey-debuginfo-0:1.0.9-0.48.el3.x86_64", "3ES:seamonkey-devel-0:1.0.9-0.48.el3.i386", "3ES:seamonkey-devel-0:1.0.9-0.48.el3.ia64", "3ES:seamonkey-devel-0:1.0.9-0.48.el3.ppc", "3ES:seamonkey-devel-0:1.0.9-0.48.el3.s390", "3ES:seamonkey-devel-0:1.0.9-0.48.el3.s390x", "3ES:seamonkey-devel-0:1.0.9-0.48.el3.x86_64", "3ES:seamonkey-dom-inspector-0:1.0.9-0.48.el3.i386", "3ES:seamonkey-dom-inspector-0:1.0.9-0.48.el3.ia64", "3ES:seamonkey-dom-inspector-0:1.0.9-0.48.el3.ppc", "3ES:seamonkey-dom-inspector-0:1.0.9-0.48.el3.s390", "3ES:seamonkey-dom-inspector-0:1.0.9-0.48.el3.s390x", "3ES:seamonkey-dom-inspector-0:1.0.9-0.48.el3.x86_64", "3ES:seamonkey-js-debugger-0:1.0.9-0.48.el3.i386", "3ES:seamonkey-js-debugger-0:1.0.9-0.48.el3.ia64", "3ES:seamonkey-js-debugger-0:1.0.9-0.48.el3.ppc", "3ES:seamonkey-js-debugger-0:1.0.9-0.48.el3.s390", "3ES:seamonkey-js-debugger-0:1.0.9-0.48.el3.s390x", "3ES:seamonkey-js-debugger-0:1.0.9-0.48.el3.x86_64", "3ES:seamonkey-mail-0:1.0.9-0.48.el3.i386", "3ES:seamonkey-mail-0:1.0.9-0.48.el3.ia64", "3ES:seamonkey-mail-0:1.0.9-0.48.el3.ppc", "3ES:seamonkey-mail-0:1.0.9-0.48.el3.s390", "3ES:seamonkey-mail-0:1.0.9-0.48.el3.s390x", "3ES:seamonkey-mail-0:1.0.9-0.48.el3.x86_64", "3ES:seamonkey-nspr-0:1.0.9-0.48.el3.i386", "3ES:seamonkey-nspr-0:1.0.9-0.48.el3.ia64", "3ES:seamonkey-nspr-0:1.0.9-0.48.el3.ppc", "3ES:seamonkey-nspr-0:1.0.9-0.48.el3.s390", "3ES:seamonkey-nspr-0:1.0.9-0.48.el3.s390x", "3ES:seamonkey-nspr-0:1.0.9-0.48.el3.x86_64", "3ES:seamonkey-nspr-devel-0:1.0.9-0.48.el3.i386", "3ES:seamonkey-nspr-devel-0:1.0.9-0.48.el3.ia64", "3ES:seamonkey-nspr-devel-0:1.0.9-0.48.el3.ppc", "3ES:seamonkey-nspr-devel-0:1.0.9-0.48.el3.s390", "3ES:seamonkey-nspr-devel-0:1.0.9-0.48.el3.s390x", "3ES:seamonkey-nspr-devel-0:1.0.9-0.48.el3.x86_64", "3ES:seamonkey-nss-0:1.0.9-0.48.el3.i386", "3ES:seamonkey-nss-0:1.0.9-0.48.el3.ia64", "3ES:seamonkey-nss-0:1.0.9-0.48.el3.ppc", "3ES:seamonkey-nss-0:1.0.9-0.48.el3.s390", "3ES:seamonkey-nss-0:1.0.9-0.48.el3.s390x", "3ES:seamonkey-nss-0:1.0.9-0.48.el3.x86_64", "3ES:seamonkey-nss-devel-0:1.0.9-0.48.el3.i386", "3ES:seamonkey-nss-devel-0:1.0.9-0.48.el3.ia64", "3ES:seamonkey-nss-devel-0:1.0.9-0.48.el3.ppc", "3ES:seamonkey-nss-devel-0:1.0.9-0.48.el3.s390", "3ES:seamonkey-nss-devel-0:1.0.9-0.48.el3.s390x", "3ES:seamonkey-nss-devel-0:1.0.9-0.48.el3.x86_64", "3WS:seamonkey-0:1.0.9-0.48.el3.i386", "3WS:seamonkey-0:1.0.9-0.48.el3.ia64", "3WS:seamonkey-0:1.0.9-0.48.el3.ppc", "3WS:seamonkey-0:1.0.9-0.48.el3.s390", "3WS:seamonkey-0:1.0.9-0.48.el3.s390x", "3WS:seamonkey-0:1.0.9-0.48.el3.src", "3WS:seamonkey-0:1.0.9-0.48.el3.x86_64", "3WS:seamonkey-chat-0:1.0.9-0.48.el3.i386", "3WS:seamonkey-chat-0:1.0.9-0.48.el3.ia64", "3WS:seamonkey-chat-0:1.0.9-0.48.el3.ppc", "3WS:seamonkey-chat-0:1.0.9-0.48.el3.s390", "3WS:seamonkey-chat-0:1.0.9-0.48.el3.s390x", "3WS:seamonkey-chat-0:1.0.9-0.48.el3.x86_64", "3WS:seamonkey-debuginfo-0:1.0.9-0.48.el3.i386", "3WS:seamonkey-debuginfo-0:1.0.9-0.48.el3.ia64", "3WS:seamonkey-debuginfo-0:1.0.9-0.48.el3.ppc", "3WS:seamonkey-debuginfo-0:1.0.9-0.48.el3.s390", "3WS:seamonkey-debuginfo-0:1.0.9-0.48.el3.s390x", "3WS:seamonkey-debuginfo-0:1.0.9-0.48.el3.x86_64", "3WS:seamonkey-devel-0:1.0.9-0.48.el3.i386", "3WS:seamonkey-devel-0:1.0.9-0.48.el3.ia64", "3WS:seamonkey-devel-0:1.0.9-0.48.el3.ppc", "3WS:seamonkey-devel-0:1.0.9-0.48.el3.s390", "3WS:seamonkey-devel-0:1.0.9-0.48.el3.s390x", "3WS:seamonkey-devel-0:1.0.9-0.48.el3.x86_64", "3WS:seamonkey-dom-inspector-0:1.0.9-0.48.el3.i386", "3WS:seamonkey-dom-inspector-0:1.0.9-0.48.el3.ia64", "3WS:seamonkey-dom-inspector-0:1.0.9-0.48.el3.ppc", "3WS:seamonkey-dom-inspector-0:1.0.9-0.48.el3.s390", "3WS:seamonkey-dom-inspector-0:1.0.9-0.48.el3.s390x", "3WS:seamonkey-dom-inspector-0:1.0.9-0.48.el3.x86_64", "3WS:seamonkey-js-debugger-0:1.0.9-0.48.el3.i386", "3WS:seamonkey-js-debugger-0:1.0.9-0.48.el3.ia64", "3WS:seamonkey-js-debugger-0:1.0.9-0.48.el3.ppc", "3WS:seamonkey-js-debugger-0:1.0.9-0.48.el3.s390", "3WS:seamonkey-js-debugger-0:1.0.9-0.48.el3.s390x", "3WS:seamonkey-js-debugger-0:1.0.9-0.48.el3.x86_64", "3WS:seamonkey-mail-0:1.0.9-0.48.el3.i386", "3WS:seamonkey-mail-0:1.0.9-0.48.el3.ia64", "3WS:seamonkey-mail-0:1.0.9-0.48.el3.ppc", "3WS:seamonkey-mail-0:1.0.9-0.48.el3.s390", "3WS:seamonkey-mail-0:1.0.9-0.48.el3.s390x", "3WS:seamonkey-mail-0:1.0.9-0.48.el3.x86_64", "3WS:seamonkey-nspr-0:1.0.9-0.48.el3.i386", "3WS:seamonkey-nspr-0:1.0.9-0.48.el3.ia64", "3WS:seamonkey-nspr-0:1.0.9-0.48.el3.ppc", "3WS:seamonkey-nspr-0:1.0.9-0.48.el3.s390", "3WS:seamonkey-nspr-0:1.0.9-0.48.el3.s390x", "3WS:seamonkey-nspr-0:1.0.9-0.48.el3.x86_64", "3WS:seamonkey-nspr-devel-0:1.0.9-0.48.el3.i386", "3WS:seamonkey-nspr-devel-0:1.0.9-0.48.el3.ia64", "3WS:seamonkey-nspr-devel-0:1.0.9-0.48.el3.ppc", "3WS:seamonkey-nspr-devel-0:1.0.9-0.48.el3.s390", "3WS:seamonkey-nspr-devel-0:1.0.9-0.48.el3.s390x", "3WS:seamonkey-nspr-devel-0:1.0.9-0.48.el3.x86_64", "3WS:seamonkey-nss-0:1.0.9-0.48.el3.i386", "3WS:seamonkey-nss-0:1.0.9-0.48.el3.ia64", "3WS:seamonkey-nss-0:1.0.9-0.48.el3.ppc", "3WS:seamonkey-nss-0:1.0.9-0.48.el3.s390", "3WS:seamonkey-nss-0:1.0.9-0.48.el3.s390x", "3WS:seamonkey-nss-0:1.0.9-0.48.el3.x86_64", "3WS:seamonkey-nss-devel-0:1.0.9-0.48.el3.i386", "3WS:seamonkey-nss-devel-0:1.0.9-0.48.el3.ia64", "3WS:seamonkey-nss-devel-0:1.0.9-0.48.el3.ppc", "3WS:seamonkey-nss-devel-0:1.0.9-0.48.el3.s390", "3WS:seamonkey-nss-devel-0:1.0.9-0.48.el3.s390x", "3WS:seamonkey-nss-devel-0:1.0.9-0.48.el3.x86_64", "4AS:seamonkey-0:1.0.9-51.el4_8.i386", "4AS:seamonkey-0:1.0.9-51.el4_8.ia64", "4AS:seamonkey-0:1.0.9-51.el4_8.ppc", "4AS:seamonkey-0:1.0.9-51.el4_8.s390", "4AS:seamonkey-0:1.0.9-51.el4_8.s390x", "4AS:seamonkey-0:1.0.9-51.el4_8.src", "4AS:seamonkey-0:1.0.9-51.el4_8.x86_64", "4AS:seamonkey-chat-0:1.0.9-51.el4_8.i386", "4AS:seamonkey-chat-0:1.0.9-51.el4_8.ia64", "4AS:seamonkey-chat-0:1.0.9-51.el4_8.ppc", "4AS:seamonkey-chat-0:1.0.9-51.el4_8.s390", "4AS:seamonkey-chat-0:1.0.9-51.el4_8.s390x", "4AS:seamonkey-chat-0:1.0.9-51.el4_8.x86_64", "4AS:seamonkey-debuginfo-0:1.0.9-51.el4_8.i386", "4AS:seamonkey-debuginfo-0:1.0.9-51.el4_8.ia64", "4AS:seamonkey-debuginfo-0:1.0.9-51.el4_8.ppc", "4AS:seamonkey-debuginfo-0:1.0.9-51.el4_8.s390", "4AS:seamonkey-debuginfo-0:1.0.9-51.el4_8.s390x", "4AS:seamonkey-debuginfo-0:1.0.9-51.el4_8.x86_64", "4AS:seamonkey-devel-0:1.0.9-51.el4_8.i386", "4AS:seamonkey-devel-0:1.0.9-51.el4_8.ia64", "4AS:seamonkey-devel-0:1.0.9-51.el4_8.ppc", "4AS:seamonkey-devel-0:1.0.9-51.el4_8.s390", "4AS:seamonkey-devel-0:1.0.9-51.el4_8.s390x", "4AS:seamonkey-devel-0:1.0.9-51.el4_8.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.9-51.el4_8.i386", "4AS:seamonkey-dom-inspector-0:1.0.9-51.el4_8.ia64", "4AS:seamonkey-dom-inspector-0:1.0.9-51.el4_8.ppc", "4AS:seamonkey-dom-inspector-0:1.0.9-51.el4_8.s390", "4AS:seamonkey-dom-inspector-0:1.0.9-51.el4_8.s390x", "4AS:seamonkey-dom-inspector-0:1.0.9-51.el4_8.x86_64", "4AS:seamonkey-js-debugger-0:1.0.9-51.el4_8.i386", "4AS:seamonkey-js-debugger-0:1.0.9-51.el4_8.ia64", "4AS:seamonkey-js-debugger-0:1.0.9-51.el4_8.ppc", "4AS:seamonkey-js-debugger-0:1.0.9-51.el4_8.s390", "4AS:seamonkey-js-debugger-0:1.0.9-51.el4_8.s390x", "4AS:seamonkey-js-debugger-0:1.0.9-51.el4_8.x86_64", "4AS:seamonkey-mail-0:1.0.9-51.el4_8.i386", "4AS:seamonkey-mail-0:1.0.9-51.el4_8.ia64", "4AS:seamonkey-mail-0:1.0.9-51.el4_8.ppc", "4AS:seamonkey-mail-0:1.0.9-51.el4_8.s390", "4AS:seamonkey-mail-0:1.0.9-51.el4_8.s390x", "4AS:seamonkey-mail-0:1.0.9-51.el4_8.x86_64", "4Desktop:seamonkey-0:1.0.9-51.el4_8.i386", "4Desktop:seamonkey-0:1.0.9-51.el4_8.ia64", "4Desktop:seamonkey-0:1.0.9-51.el4_8.ppc", "4Desktop:seamonkey-0:1.0.9-51.el4_8.s390", "4Desktop:seamonkey-0:1.0.9-51.el4_8.s390x", "4Desktop:seamonkey-0:1.0.9-51.el4_8.src", "4Desktop:seamonkey-0:1.0.9-51.el4_8.x86_64", "4Desktop:seamonkey-chat-0:1.0.9-51.el4_8.i386", "4Desktop:seamonkey-chat-0:1.0.9-51.el4_8.ia64", "4Desktop:seamonkey-chat-0:1.0.9-51.el4_8.ppc", "4Desktop:seamonkey-chat-0:1.0.9-51.el4_8.s390", "4Desktop:seamonkey-chat-0:1.0.9-51.el4_8.s390x", "4Desktop:seamonkey-chat-0:1.0.9-51.el4_8.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.9-51.el4_8.i386", "4Desktop:seamonkey-debuginfo-0:1.0.9-51.el4_8.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.9-51.el4_8.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.9-51.el4_8.s390", "4Desktop:seamonkey-debuginfo-0:1.0.9-51.el4_8.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.9-51.el4_8.x86_64", "4Desktop:seamonkey-devel-0:1.0.9-51.el4_8.i386", "4Desktop:seamonkey-devel-0:1.0.9-51.el4_8.ia64", "4Desktop:seamonkey-devel-0:1.0.9-51.el4_8.ppc", "4Desktop:seamonkey-devel-0:1.0.9-51.el4_8.s390", "4Desktop:seamonkey-devel-0:1.0.9-51.el4_8.s390x", "4Desktop:seamonkey-devel-0:1.0.9-51.el4_8.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.9-51.el4_8.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.9-51.el4_8.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.9-51.el4_8.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.9-51.el4_8.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.9-51.el4_8.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.9-51.el4_8.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.9-51.el4_8.i386", "4Desktop:seamonkey-js-debugger-0:1.0.9-51.el4_8.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.9-51.el4_8.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.9-51.el4_8.s390", "4Desktop:seamonkey-js-debugger-0:1.0.9-51.el4_8.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.9-51.el4_8.x86_64", "4Desktop:seamonkey-mail-0:1.0.9-51.el4_8.i386", "4Desktop:seamonkey-mail-0:1.0.9-51.el4_8.ia64", "4Desktop:seamonkey-mail-0:1.0.9-51.el4_8.ppc", "4Desktop:seamonkey-mail-0:1.0.9-51.el4_8.s390", "4Desktop:seamonkey-mail-0:1.0.9-51.el4_8.s390x", "4Desktop:seamonkey-mail-0:1.0.9-51.el4_8.x86_64", "4ES:seamonkey-0:1.0.9-51.el4_8.i386", "4ES:seamonkey-0:1.0.9-51.el4_8.ia64", "4ES:seamonkey-0:1.0.9-51.el4_8.ppc", "4ES:seamonkey-0:1.0.9-51.el4_8.s390", "4ES:seamonkey-0:1.0.9-51.el4_8.s390x", "4ES:seamonkey-0:1.0.9-51.el4_8.src", "4ES:seamonkey-0:1.0.9-51.el4_8.x86_64", "4ES:seamonkey-chat-0:1.0.9-51.el4_8.i386", "4ES:seamonkey-chat-0:1.0.9-51.el4_8.ia64", "4ES:seamonkey-chat-0:1.0.9-51.el4_8.ppc", "4ES:seamonkey-chat-0:1.0.9-51.el4_8.s390", "4ES:seamonkey-chat-0:1.0.9-51.el4_8.s390x", "4ES:seamonkey-chat-0:1.0.9-51.el4_8.x86_64", "4ES:seamonkey-debuginfo-0:1.0.9-51.el4_8.i386", "4ES:seamonkey-debuginfo-0:1.0.9-51.el4_8.ia64", "4ES:seamonkey-debuginfo-0:1.0.9-51.el4_8.ppc", "4ES:seamonkey-debuginfo-0:1.0.9-51.el4_8.s390", "4ES:seamonkey-debuginfo-0:1.0.9-51.el4_8.s390x", "4ES:seamonkey-debuginfo-0:1.0.9-51.el4_8.x86_64", "4ES:seamonkey-devel-0:1.0.9-51.el4_8.i386", "4ES:seamonkey-devel-0:1.0.9-51.el4_8.ia64", "4ES:seamonkey-devel-0:1.0.9-51.el4_8.ppc", "4ES:seamonkey-devel-0:1.0.9-51.el4_8.s390", "4ES:seamonkey-devel-0:1.0.9-51.el4_8.s390x", "4ES:seamonkey-devel-0:1.0.9-51.el4_8.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.9-51.el4_8.i386", "4ES:seamonkey-dom-inspector-0:1.0.9-51.el4_8.ia64", "4ES:seamonkey-dom-inspector-0:1.0.9-51.el4_8.ppc", "4ES:seamonkey-dom-inspector-0:1.0.9-51.el4_8.s390", "4ES:seamonkey-dom-inspector-0:1.0.9-51.el4_8.s390x", "4ES:seamonkey-dom-inspector-0:1.0.9-51.el4_8.x86_64", "4ES:seamonkey-js-debugger-0:1.0.9-51.el4_8.i386", "4ES:seamonkey-js-debugger-0:1.0.9-51.el4_8.ia64", "4ES:seamonkey-js-debugger-0:1.0.9-51.el4_8.ppc", "4ES:seamonkey-js-debugger-0:1.0.9-51.el4_8.s390", "4ES:seamonkey-js-debugger-0:1.0.9-51.el4_8.s390x", "4ES:seamonkey-js-debugger-0:1.0.9-51.el4_8.x86_64", "4ES:seamonkey-mail-0:1.0.9-51.el4_8.i386", "4ES:seamonkey-mail-0:1.0.9-51.el4_8.ia64", "4ES:seamonkey-mail-0:1.0.9-51.el4_8.ppc", "4ES:seamonkey-mail-0:1.0.9-51.el4_8.s390", "4ES:seamonkey-mail-0:1.0.9-51.el4_8.s390x", "4ES:seamonkey-mail-0:1.0.9-51.el4_8.x86_64", "4WS:seamonkey-0:1.0.9-51.el4_8.i386", "4WS:seamonkey-0:1.0.9-51.el4_8.ia64", "4WS:seamonkey-0:1.0.9-51.el4_8.ppc", "4WS:seamonkey-0:1.0.9-51.el4_8.s390", "4WS:seamonkey-0:1.0.9-51.el4_8.s390x", "4WS:seamonkey-0:1.0.9-51.el4_8.src", "4WS:seamonkey-0:1.0.9-51.el4_8.x86_64", "4WS:seamonkey-chat-0:1.0.9-51.el4_8.i386", "4WS:seamonkey-chat-0:1.0.9-51.el4_8.ia64", "4WS:seamonkey-chat-0:1.0.9-51.el4_8.ppc", "4WS:seamonkey-chat-0:1.0.9-51.el4_8.s390", "4WS:seamonkey-chat-0:1.0.9-51.el4_8.s390x", "4WS:seamonkey-chat-0:1.0.9-51.el4_8.x86_64", "4WS:seamonkey-debuginfo-0:1.0.9-51.el4_8.i386", "4WS:seamonkey-debuginfo-0:1.0.9-51.el4_8.ia64", "4WS:seamonkey-debuginfo-0:1.0.9-51.el4_8.ppc", "4WS:seamonkey-debuginfo-0:1.0.9-51.el4_8.s390", "4WS:seamonkey-debuginfo-0:1.0.9-51.el4_8.s390x", "4WS:seamonkey-debuginfo-0:1.0.9-51.el4_8.x86_64", "4WS:seamonkey-devel-0:1.0.9-51.el4_8.i386", "4WS:seamonkey-devel-0:1.0.9-51.el4_8.ia64", "4WS:seamonkey-devel-0:1.0.9-51.el4_8.ppc", "4WS:seamonkey-devel-0:1.0.9-51.el4_8.s390", "4WS:seamonkey-devel-0:1.0.9-51.el4_8.s390x", "4WS:seamonkey-devel-0:1.0.9-51.el4_8.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.9-51.el4_8.i386", "4WS:seamonkey-dom-inspector-0:1.0.9-51.el4_8.ia64", "4WS:seamonkey-dom-inspector-0:1.0.9-51.el4_8.ppc", "4WS:seamonkey-dom-inspector-0:1.0.9-51.el4_8.s390", "4WS:seamonkey-dom-inspector-0:1.0.9-51.el4_8.s390x", "4WS:seamonkey-dom-inspector-0:1.0.9-51.el4_8.x86_64", "4WS:seamonkey-js-debugger-0:1.0.9-51.el4_8.i386", "4WS:seamonkey-js-debugger-0:1.0.9-51.el4_8.ia64", "4WS:seamonkey-js-debugger-0:1.0.9-51.el4_8.ppc", "4WS:seamonkey-js-debugger-0:1.0.9-51.el4_8.s390", "4WS:seamonkey-js-debugger-0:1.0.9-51.el4_8.s390x", "4WS:seamonkey-js-debugger-0:1.0.9-51.el4_8.x86_64", "4WS:seamonkey-mail-0:1.0.9-51.el4_8.i386", "4WS:seamonkey-mail-0:1.0.9-51.el4_8.ia64", "4WS:seamonkey-mail-0:1.0.9-51.el4_8.ppc", "4WS:seamonkey-mail-0:1.0.9-51.el4_8.s390", "4WS:seamonkey-mail-0:1.0.9-51.el4_8.s390x", "4WS:seamonkey-mail-0:1.0.9-51.el4_8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1673" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "3AS:seamonkey-0:1.0.9-0.48.el3.i386", "3AS:seamonkey-0:1.0.9-0.48.el3.ia64", "3AS:seamonkey-0:1.0.9-0.48.el3.ppc", "3AS:seamonkey-0:1.0.9-0.48.el3.s390", "3AS:seamonkey-0:1.0.9-0.48.el3.s390x", "3AS:seamonkey-0:1.0.9-0.48.el3.src", "3AS:seamonkey-0:1.0.9-0.48.el3.x86_64", "3AS:seamonkey-chat-0:1.0.9-0.48.el3.i386", "3AS:seamonkey-chat-0:1.0.9-0.48.el3.ia64", "3AS:seamonkey-chat-0:1.0.9-0.48.el3.ppc", "3AS:seamonkey-chat-0:1.0.9-0.48.el3.s390", "3AS:seamonkey-chat-0:1.0.9-0.48.el3.s390x", "3AS:seamonkey-chat-0:1.0.9-0.48.el3.x86_64", "3AS:seamonkey-debuginfo-0:1.0.9-0.48.el3.i386", "3AS:seamonkey-debuginfo-0:1.0.9-0.48.el3.ia64", "3AS:seamonkey-debuginfo-0:1.0.9-0.48.el3.ppc", "3AS:seamonkey-debuginfo-0:1.0.9-0.48.el3.s390", "3AS:seamonkey-debuginfo-0:1.0.9-0.48.el3.s390x", "3AS:seamonkey-debuginfo-0:1.0.9-0.48.el3.x86_64", "3AS:seamonkey-devel-0:1.0.9-0.48.el3.i386", "3AS:seamonkey-devel-0:1.0.9-0.48.el3.ia64", "3AS:seamonkey-devel-0:1.0.9-0.48.el3.ppc", "3AS:seamonkey-devel-0:1.0.9-0.48.el3.s390", "3AS:seamonkey-devel-0:1.0.9-0.48.el3.s390x", "3AS:seamonkey-devel-0:1.0.9-0.48.el3.x86_64", "3AS:seamonkey-dom-inspector-0:1.0.9-0.48.el3.i386", "3AS:seamonkey-dom-inspector-0:1.0.9-0.48.el3.ia64", "3AS:seamonkey-dom-inspector-0:1.0.9-0.48.el3.ppc", "3AS:seamonkey-dom-inspector-0:1.0.9-0.48.el3.s390", "3AS:seamonkey-dom-inspector-0:1.0.9-0.48.el3.s390x", "3AS:seamonkey-dom-inspector-0:1.0.9-0.48.el3.x86_64", "3AS:seamonkey-js-debugger-0:1.0.9-0.48.el3.i386", "3AS:seamonkey-js-debugger-0:1.0.9-0.48.el3.ia64", "3AS:seamonkey-js-debugger-0:1.0.9-0.48.el3.ppc", "3AS:seamonkey-js-debugger-0:1.0.9-0.48.el3.s390", "3AS:seamonkey-js-debugger-0:1.0.9-0.48.el3.s390x", "3AS:seamonkey-js-debugger-0:1.0.9-0.48.el3.x86_64", "3AS:seamonkey-mail-0:1.0.9-0.48.el3.i386", "3AS:seamonkey-mail-0:1.0.9-0.48.el3.ia64", "3AS:seamonkey-mail-0:1.0.9-0.48.el3.ppc", "3AS:seamonkey-mail-0:1.0.9-0.48.el3.s390", "3AS:seamonkey-mail-0:1.0.9-0.48.el3.s390x", "3AS:seamonkey-mail-0:1.0.9-0.48.el3.x86_64", "3AS:seamonkey-nspr-0:1.0.9-0.48.el3.i386", "3AS:seamonkey-nspr-0:1.0.9-0.48.el3.ia64", "3AS:seamonkey-nspr-0:1.0.9-0.48.el3.ppc", "3AS:seamonkey-nspr-0:1.0.9-0.48.el3.s390", "3AS:seamonkey-nspr-0:1.0.9-0.48.el3.s390x", "3AS:seamonkey-nspr-0:1.0.9-0.48.el3.x86_64", "3AS:seamonkey-nspr-devel-0:1.0.9-0.48.el3.i386", "3AS:seamonkey-nspr-devel-0:1.0.9-0.48.el3.ia64", "3AS:seamonkey-nspr-devel-0:1.0.9-0.48.el3.ppc", "3AS:seamonkey-nspr-devel-0:1.0.9-0.48.el3.s390", "3AS:seamonkey-nspr-devel-0:1.0.9-0.48.el3.s390x", "3AS:seamonkey-nspr-devel-0:1.0.9-0.48.el3.x86_64", "3AS:seamonkey-nss-0:1.0.9-0.48.el3.i386", "3AS:seamonkey-nss-0:1.0.9-0.48.el3.ia64", "3AS:seamonkey-nss-0:1.0.9-0.48.el3.ppc", "3AS:seamonkey-nss-0:1.0.9-0.48.el3.s390", "3AS:seamonkey-nss-0:1.0.9-0.48.el3.s390x", "3AS:seamonkey-nss-0:1.0.9-0.48.el3.x86_64", "3AS:seamonkey-nss-devel-0:1.0.9-0.48.el3.i386", "3AS:seamonkey-nss-devel-0:1.0.9-0.48.el3.ia64", "3AS:seamonkey-nss-devel-0:1.0.9-0.48.el3.ppc", "3AS:seamonkey-nss-devel-0:1.0.9-0.48.el3.s390", "3AS:seamonkey-nss-devel-0:1.0.9-0.48.el3.s390x", "3AS:seamonkey-nss-devel-0:1.0.9-0.48.el3.x86_64", "3Desktop:seamonkey-0:1.0.9-0.48.el3.i386", "3Desktop:seamonkey-0:1.0.9-0.48.el3.ia64", "3Desktop:seamonkey-0:1.0.9-0.48.el3.ppc", "3Desktop:seamonkey-0:1.0.9-0.48.el3.s390", "3Desktop:seamonkey-0:1.0.9-0.48.el3.s390x", "3Desktop:seamonkey-0:1.0.9-0.48.el3.src", "3Desktop:seamonkey-0:1.0.9-0.48.el3.x86_64", "3Desktop:seamonkey-chat-0:1.0.9-0.48.el3.i386", "3Desktop:seamonkey-chat-0:1.0.9-0.48.el3.ia64", "3Desktop:seamonkey-chat-0:1.0.9-0.48.el3.ppc", "3Desktop:seamonkey-chat-0:1.0.9-0.48.el3.s390", "3Desktop:seamonkey-chat-0:1.0.9-0.48.el3.s390x", "3Desktop:seamonkey-chat-0:1.0.9-0.48.el3.x86_64", "3Desktop:seamonkey-debuginfo-0:1.0.9-0.48.el3.i386", "3Desktop:seamonkey-debuginfo-0:1.0.9-0.48.el3.ia64", "3Desktop:seamonkey-debuginfo-0:1.0.9-0.48.el3.ppc", "3Desktop:seamonkey-debuginfo-0:1.0.9-0.48.el3.s390", "3Desktop:seamonkey-debuginfo-0:1.0.9-0.48.el3.s390x", "3Desktop:seamonkey-debuginfo-0:1.0.9-0.48.el3.x86_64", "3Desktop:seamonkey-devel-0:1.0.9-0.48.el3.i386", "3Desktop:seamonkey-devel-0:1.0.9-0.48.el3.ia64", "3Desktop:seamonkey-devel-0:1.0.9-0.48.el3.ppc", "3Desktop:seamonkey-devel-0:1.0.9-0.48.el3.s390", "3Desktop:seamonkey-devel-0:1.0.9-0.48.el3.s390x", "3Desktop:seamonkey-devel-0:1.0.9-0.48.el3.x86_64", "3Desktop:seamonkey-dom-inspector-0:1.0.9-0.48.el3.i386", "3Desktop:seamonkey-dom-inspector-0:1.0.9-0.48.el3.ia64", "3Desktop:seamonkey-dom-inspector-0:1.0.9-0.48.el3.ppc", "3Desktop:seamonkey-dom-inspector-0:1.0.9-0.48.el3.s390", "3Desktop:seamonkey-dom-inspector-0:1.0.9-0.48.el3.s390x", "3Desktop:seamonkey-dom-inspector-0:1.0.9-0.48.el3.x86_64", "3Desktop:seamonkey-js-debugger-0:1.0.9-0.48.el3.i386", "3Desktop:seamonkey-js-debugger-0:1.0.9-0.48.el3.ia64", "3Desktop:seamonkey-js-debugger-0:1.0.9-0.48.el3.ppc", "3Desktop:seamonkey-js-debugger-0:1.0.9-0.48.el3.s390", "3Desktop:seamonkey-js-debugger-0:1.0.9-0.48.el3.s390x", "3Desktop:seamonkey-js-debugger-0:1.0.9-0.48.el3.x86_64", "3Desktop:seamonkey-mail-0:1.0.9-0.48.el3.i386", "3Desktop:seamonkey-mail-0:1.0.9-0.48.el3.ia64", "3Desktop:seamonkey-mail-0:1.0.9-0.48.el3.ppc", "3Desktop:seamonkey-mail-0:1.0.9-0.48.el3.s390", "3Desktop:seamonkey-mail-0:1.0.9-0.48.el3.s390x", "3Desktop:seamonkey-mail-0:1.0.9-0.48.el3.x86_64", "3Desktop:seamonkey-nspr-0:1.0.9-0.48.el3.i386", "3Desktop:seamonkey-nspr-0:1.0.9-0.48.el3.ia64", "3Desktop:seamonkey-nspr-0:1.0.9-0.48.el3.ppc", "3Desktop:seamonkey-nspr-0:1.0.9-0.48.el3.s390", "3Desktop:seamonkey-nspr-0:1.0.9-0.48.el3.s390x", "3Desktop:seamonkey-nspr-0:1.0.9-0.48.el3.x86_64", "3Desktop:seamonkey-nspr-devel-0:1.0.9-0.48.el3.i386", "3Desktop:seamonkey-nspr-devel-0:1.0.9-0.48.el3.ia64", "3Desktop:seamonkey-nspr-devel-0:1.0.9-0.48.el3.ppc", "3Desktop:seamonkey-nspr-devel-0:1.0.9-0.48.el3.s390", "3Desktop:seamonkey-nspr-devel-0:1.0.9-0.48.el3.s390x", "3Desktop:seamonkey-nspr-devel-0:1.0.9-0.48.el3.x86_64", "3Desktop:seamonkey-nss-0:1.0.9-0.48.el3.i386", "3Desktop:seamonkey-nss-0:1.0.9-0.48.el3.ia64", "3Desktop:seamonkey-nss-0:1.0.9-0.48.el3.ppc", "3Desktop:seamonkey-nss-0:1.0.9-0.48.el3.s390", "3Desktop:seamonkey-nss-0:1.0.9-0.48.el3.s390x", "3Desktop:seamonkey-nss-0:1.0.9-0.48.el3.x86_64", "3Desktop:seamonkey-nss-devel-0:1.0.9-0.48.el3.i386", "3Desktop:seamonkey-nss-devel-0:1.0.9-0.48.el3.ia64", "3Desktop:seamonkey-nss-devel-0:1.0.9-0.48.el3.ppc", "3Desktop:seamonkey-nss-devel-0:1.0.9-0.48.el3.s390", "3Desktop:seamonkey-nss-devel-0:1.0.9-0.48.el3.s390x", "3Desktop:seamonkey-nss-devel-0:1.0.9-0.48.el3.x86_64", "3ES:seamonkey-0:1.0.9-0.48.el3.i386", "3ES:seamonkey-0:1.0.9-0.48.el3.ia64", "3ES:seamonkey-0:1.0.9-0.48.el3.ppc", "3ES:seamonkey-0:1.0.9-0.48.el3.s390", "3ES:seamonkey-0:1.0.9-0.48.el3.s390x", "3ES:seamonkey-0:1.0.9-0.48.el3.src", "3ES:seamonkey-0:1.0.9-0.48.el3.x86_64", "3ES:seamonkey-chat-0:1.0.9-0.48.el3.i386", "3ES:seamonkey-chat-0:1.0.9-0.48.el3.ia64", "3ES:seamonkey-chat-0:1.0.9-0.48.el3.ppc", "3ES:seamonkey-chat-0:1.0.9-0.48.el3.s390", "3ES:seamonkey-chat-0:1.0.9-0.48.el3.s390x", "3ES:seamonkey-chat-0:1.0.9-0.48.el3.x86_64", "3ES:seamonkey-debuginfo-0:1.0.9-0.48.el3.i386", "3ES:seamonkey-debuginfo-0:1.0.9-0.48.el3.ia64", "3ES:seamonkey-debuginfo-0:1.0.9-0.48.el3.ppc", "3ES:seamonkey-debuginfo-0:1.0.9-0.48.el3.s390", "3ES:seamonkey-debuginfo-0:1.0.9-0.48.el3.s390x", "3ES:seamonkey-debuginfo-0:1.0.9-0.48.el3.x86_64", "3ES:seamonkey-devel-0:1.0.9-0.48.el3.i386", "3ES:seamonkey-devel-0:1.0.9-0.48.el3.ia64", "3ES:seamonkey-devel-0:1.0.9-0.48.el3.ppc", "3ES:seamonkey-devel-0:1.0.9-0.48.el3.s390", "3ES:seamonkey-devel-0:1.0.9-0.48.el3.s390x", "3ES:seamonkey-devel-0:1.0.9-0.48.el3.x86_64", "3ES:seamonkey-dom-inspector-0:1.0.9-0.48.el3.i386", "3ES:seamonkey-dom-inspector-0:1.0.9-0.48.el3.ia64", "3ES:seamonkey-dom-inspector-0:1.0.9-0.48.el3.ppc", "3ES:seamonkey-dom-inspector-0:1.0.9-0.48.el3.s390", "3ES:seamonkey-dom-inspector-0:1.0.9-0.48.el3.s390x", "3ES:seamonkey-dom-inspector-0:1.0.9-0.48.el3.x86_64", "3ES:seamonkey-js-debugger-0:1.0.9-0.48.el3.i386", "3ES:seamonkey-js-debugger-0:1.0.9-0.48.el3.ia64", "3ES:seamonkey-js-debugger-0:1.0.9-0.48.el3.ppc", "3ES:seamonkey-js-debugger-0:1.0.9-0.48.el3.s390", "3ES:seamonkey-js-debugger-0:1.0.9-0.48.el3.s390x", "3ES:seamonkey-js-debugger-0:1.0.9-0.48.el3.x86_64", "3ES:seamonkey-mail-0:1.0.9-0.48.el3.i386", "3ES:seamonkey-mail-0:1.0.9-0.48.el3.ia64", "3ES:seamonkey-mail-0:1.0.9-0.48.el3.ppc", "3ES:seamonkey-mail-0:1.0.9-0.48.el3.s390", "3ES:seamonkey-mail-0:1.0.9-0.48.el3.s390x", "3ES:seamonkey-mail-0:1.0.9-0.48.el3.x86_64", "3ES:seamonkey-nspr-0:1.0.9-0.48.el3.i386", "3ES:seamonkey-nspr-0:1.0.9-0.48.el3.ia64", "3ES:seamonkey-nspr-0:1.0.9-0.48.el3.ppc", "3ES:seamonkey-nspr-0:1.0.9-0.48.el3.s390", "3ES:seamonkey-nspr-0:1.0.9-0.48.el3.s390x", "3ES:seamonkey-nspr-0:1.0.9-0.48.el3.x86_64", "3ES:seamonkey-nspr-devel-0:1.0.9-0.48.el3.i386", "3ES:seamonkey-nspr-devel-0:1.0.9-0.48.el3.ia64", "3ES:seamonkey-nspr-devel-0:1.0.9-0.48.el3.ppc", "3ES:seamonkey-nspr-devel-0:1.0.9-0.48.el3.s390", "3ES:seamonkey-nspr-devel-0:1.0.9-0.48.el3.s390x", "3ES:seamonkey-nspr-devel-0:1.0.9-0.48.el3.x86_64", "3ES:seamonkey-nss-0:1.0.9-0.48.el3.i386", "3ES:seamonkey-nss-0:1.0.9-0.48.el3.ia64", "3ES:seamonkey-nss-0:1.0.9-0.48.el3.ppc", "3ES:seamonkey-nss-0:1.0.9-0.48.el3.s390", "3ES:seamonkey-nss-0:1.0.9-0.48.el3.s390x", "3ES:seamonkey-nss-0:1.0.9-0.48.el3.x86_64", "3ES:seamonkey-nss-devel-0:1.0.9-0.48.el3.i386", "3ES:seamonkey-nss-devel-0:1.0.9-0.48.el3.ia64", "3ES:seamonkey-nss-devel-0:1.0.9-0.48.el3.ppc", "3ES:seamonkey-nss-devel-0:1.0.9-0.48.el3.s390", "3ES:seamonkey-nss-devel-0:1.0.9-0.48.el3.s390x", "3ES:seamonkey-nss-devel-0:1.0.9-0.48.el3.x86_64", "3WS:seamonkey-0:1.0.9-0.48.el3.i386", "3WS:seamonkey-0:1.0.9-0.48.el3.ia64", "3WS:seamonkey-0:1.0.9-0.48.el3.ppc", "3WS:seamonkey-0:1.0.9-0.48.el3.s390", "3WS:seamonkey-0:1.0.9-0.48.el3.s390x", "3WS:seamonkey-0:1.0.9-0.48.el3.src", "3WS:seamonkey-0:1.0.9-0.48.el3.x86_64", "3WS:seamonkey-chat-0:1.0.9-0.48.el3.i386", "3WS:seamonkey-chat-0:1.0.9-0.48.el3.ia64", "3WS:seamonkey-chat-0:1.0.9-0.48.el3.ppc", "3WS:seamonkey-chat-0:1.0.9-0.48.el3.s390", "3WS:seamonkey-chat-0:1.0.9-0.48.el3.s390x", "3WS:seamonkey-chat-0:1.0.9-0.48.el3.x86_64", "3WS:seamonkey-debuginfo-0:1.0.9-0.48.el3.i386", "3WS:seamonkey-debuginfo-0:1.0.9-0.48.el3.ia64", "3WS:seamonkey-debuginfo-0:1.0.9-0.48.el3.ppc", "3WS:seamonkey-debuginfo-0:1.0.9-0.48.el3.s390", "3WS:seamonkey-debuginfo-0:1.0.9-0.48.el3.s390x", "3WS:seamonkey-debuginfo-0:1.0.9-0.48.el3.x86_64", "3WS:seamonkey-devel-0:1.0.9-0.48.el3.i386", "3WS:seamonkey-devel-0:1.0.9-0.48.el3.ia64", "3WS:seamonkey-devel-0:1.0.9-0.48.el3.ppc", "3WS:seamonkey-devel-0:1.0.9-0.48.el3.s390", "3WS:seamonkey-devel-0:1.0.9-0.48.el3.s390x", "3WS:seamonkey-devel-0:1.0.9-0.48.el3.x86_64", "3WS:seamonkey-dom-inspector-0:1.0.9-0.48.el3.i386", "3WS:seamonkey-dom-inspector-0:1.0.9-0.48.el3.ia64", "3WS:seamonkey-dom-inspector-0:1.0.9-0.48.el3.ppc", "3WS:seamonkey-dom-inspector-0:1.0.9-0.48.el3.s390", "3WS:seamonkey-dom-inspector-0:1.0.9-0.48.el3.s390x", "3WS:seamonkey-dom-inspector-0:1.0.9-0.48.el3.x86_64", "3WS:seamonkey-js-debugger-0:1.0.9-0.48.el3.i386", "3WS:seamonkey-js-debugger-0:1.0.9-0.48.el3.ia64", "3WS:seamonkey-js-debugger-0:1.0.9-0.48.el3.ppc", "3WS:seamonkey-js-debugger-0:1.0.9-0.48.el3.s390", "3WS:seamonkey-js-debugger-0:1.0.9-0.48.el3.s390x", "3WS:seamonkey-js-debugger-0:1.0.9-0.48.el3.x86_64", "3WS:seamonkey-mail-0:1.0.9-0.48.el3.i386", "3WS:seamonkey-mail-0:1.0.9-0.48.el3.ia64", "3WS:seamonkey-mail-0:1.0.9-0.48.el3.ppc", "3WS:seamonkey-mail-0:1.0.9-0.48.el3.s390", "3WS:seamonkey-mail-0:1.0.9-0.48.el3.s390x", "3WS:seamonkey-mail-0:1.0.9-0.48.el3.x86_64", "3WS:seamonkey-nspr-0:1.0.9-0.48.el3.i386", "3WS:seamonkey-nspr-0:1.0.9-0.48.el3.ia64", "3WS:seamonkey-nspr-0:1.0.9-0.48.el3.ppc", "3WS:seamonkey-nspr-0:1.0.9-0.48.el3.s390", "3WS:seamonkey-nspr-0:1.0.9-0.48.el3.s390x", "3WS:seamonkey-nspr-0:1.0.9-0.48.el3.x86_64", "3WS:seamonkey-nspr-devel-0:1.0.9-0.48.el3.i386", "3WS:seamonkey-nspr-devel-0:1.0.9-0.48.el3.ia64", "3WS:seamonkey-nspr-devel-0:1.0.9-0.48.el3.ppc", "3WS:seamonkey-nspr-devel-0:1.0.9-0.48.el3.s390", "3WS:seamonkey-nspr-devel-0:1.0.9-0.48.el3.s390x", "3WS:seamonkey-nspr-devel-0:1.0.9-0.48.el3.x86_64", "3WS:seamonkey-nss-0:1.0.9-0.48.el3.i386", "3WS:seamonkey-nss-0:1.0.9-0.48.el3.ia64", "3WS:seamonkey-nss-0:1.0.9-0.48.el3.ppc", "3WS:seamonkey-nss-0:1.0.9-0.48.el3.s390", "3WS:seamonkey-nss-0:1.0.9-0.48.el3.s390x", "3WS:seamonkey-nss-0:1.0.9-0.48.el3.x86_64", "3WS:seamonkey-nss-devel-0:1.0.9-0.48.el3.i386", "3WS:seamonkey-nss-devel-0:1.0.9-0.48.el3.ia64", "3WS:seamonkey-nss-devel-0:1.0.9-0.48.el3.ppc", "3WS:seamonkey-nss-devel-0:1.0.9-0.48.el3.s390", "3WS:seamonkey-nss-devel-0:1.0.9-0.48.el3.s390x", "3WS:seamonkey-nss-devel-0:1.0.9-0.48.el3.x86_64", "4AS:seamonkey-0:1.0.9-51.el4_8.i386", "4AS:seamonkey-0:1.0.9-51.el4_8.ia64", "4AS:seamonkey-0:1.0.9-51.el4_8.ppc", "4AS:seamonkey-0:1.0.9-51.el4_8.s390", "4AS:seamonkey-0:1.0.9-51.el4_8.s390x", "4AS:seamonkey-0:1.0.9-51.el4_8.src", "4AS:seamonkey-0:1.0.9-51.el4_8.x86_64", "4AS:seamonkey-chat-0:1.0.9-51.el4_8.i386", "4AS:seamonkey-chat-0:1.0.9-51.el4_8.ia64", "4AS:seamonkey-chat-0:1.0.9-51.el4_8.ppc", "4AS:seamonkey-chat-0:1.0.9-51.el4_8.s390", "4AS:seamonkey-chat-0:1.0.9-51.el4_8.s390x", "4AS:seamonkey-chat-0:1.0.9-51.el4_8.x86_64", "4AS:seamonkey-debuginfo-0:1.0.9-51.el4_8.i386", "4AS:seamonkey-debuginfo-0:1.0.9-51.el4_8.ia64", "4AS:seamonkey-debuginfo-0:1.0.9-51.el4_8.ppc", "4AS:seamonkey-debuginfo-0:1.0.9-51.el4_8.s390", "4AS:seamonkey-debuginfo-0:1.0.9-51.el4_8.s390x", "4AS:seamonkey-debuginfo-0:1.0.9-51.el4_8.x86_64", "4AS:seamonkey-devel-0:1.0.9-51.el4_8.i386", "4AS:seamonkey-devel-0:1.0.9-51.el4_8.ia64", "4AS:seamonkey-devel-0:1.0.9-51.el4_8.ppc", "4AS:seamonkey-devel-0:1.0.9-51.el4_8.s390", "4AS:seamonkey-devel-0:1.0.9-51.el4_8.s390x", "4AS:seamonkey-devel-0:1.0.9-51.el4_8.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.9-51.el4_8.i386", "4AS:seamonkey-dom-inspector-0:1.0.9-51.el4_8.ia64", "4AS:seamonkey-dom-inspector-0:1.0.9-51.el4_8.ppc", "4AS:seamonkey-dom-inspector-0:1.0.9-51.el4_8.s390", "4AS:seamonkey-dom-inspector-0:1.0.9-51.el4_8.s390x", "4AS:seamonkey-dom-inspector-0:1.0.9-51.el4_8.x86_64", "4AS:seamonkey-js-debugger-0:1.0.9-51.el4_8.i386", "4AS:seamonkey-js-debugger-0:1.0.9-51.el4_8.ia64", "4AS:seamonkey-js-debugger-0:1.0.9-51.el4_8.ppc", "4AS:seamonkey-js-debugger-0:1.0.9-51.el4_8.s390", "4AS:seamonkey-js-debugger-0:1.0.9-51.el4_8.s390x", "4AS:seamonkey-js-debugger-0:1.0.9-51.el4_8.x86_64", "4AS:seamonkey-mail-0:1.0.9-51.el4_8.i386", "4AS:seamonkey-mail-0:1.0.9-51.el4_8.ia64", "4AS:seamonkey-mail-0:1.0.9-51.el4_8.ppc", "4AS:seamonkey-mail-0:1.0.9-51.el4_8.s390", "4AS:seamonkey-mail-0:1.0.9-51.el4_8.s390x", "4AS:seamonkey-mail-0:1.0.9-51.el4_8.x86_64", "4Desktop:seamonkey-0:1.0.9-51.el4_8.i386", "4Desktop:seamonkey-0:1.0.9-51.el4_8.ia64", "4Desktop:seamonkey-0:1.0.9-51.el4_8.ppc", "4Desktop:seamonkey-0:1.0.9-51.el4_8.s390", "4Desktop:seamonkey-0:1.0.9-51.el4_8.s390x", "4Desktop:seamonkey-0:1.0.9-51.el4_8.src", "4Desktop:seamonkey-0:1.0.9-51.el4_8.x86_64", "4Desktop:seamonkey-chat-0:1.0.9-51.el4_8.i386", "4Desktop:seamonkey-chat-0:1.0.9-51.el4_8.ia64", "4Desktop:seamonkey-chat-0:1.0.9-51.el4_8.ppc", "4Desktop:seamonkey-chat-0:1.0.9-51.el4_8.s390", "4Desktop:seamonkey-chat-0:1.0.9-51.el4_8.s390x", "4Desktop:seamonkey-chat-0:1.0.9-51.el4_8.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.9-51.el4_8.i386", "4Desktop:seamonkey-debuginfo-0:1.0.9-51.el4_8.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.9-51.el4_8.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.9-51.el4_8.s390", "4Desktop:seamonkey-debuginfo-0:1.0.9-51.el4_8.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.9-51.el4_8.x86_64", "4Desktop:seamonkey-devel-0:1.0.9-51.el4_8.i386", "4Desktop:seamonkey-devel-0:1.0.9-51.el4_8.ia64", "4Desktop:seamonkey-devel-0:1.0.9-51.el4_8.ppc", "4Desktop:seamonkey-devel-0:1.0.9-51.el4_8.s390", "4Desktop:seamonkey-devel-0:1.0.9-51.el4_8.s390x", "4Desktop:seamonkey-devel-0:1.0.9-51.el4_8.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.9-51.el4_8.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.9-51.el4_8.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.9-51.el4_8.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.9-51.el4_8.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.9-51.el4_8.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.9-51.el4_8.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.9-51.el4_8.i386", "4Desktop:seamonkey-js-debugger-0:1.0.9-51.el4_8.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.9-51.el4_8.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.9-51.el4_8.s390", "4Desktop:seamonkey-js-debugger-0:1.0.9-51.el4_8.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.9-51.el4_8.x86_64", "4Desktop:seamonkey-mail-0:1.0.9-51.el4_8.i386", "4Desktop:seamonkey-mail-0:1.0.9-51.el4_8.ia64", "4Desktop:seamonkey-mail-0:1.0.9-51.el4_8.ppc", "4Desktop:seamonkey-mail-0:1.0.9-51.el4_8.s390", "4Desktop:seamonkey-mail-0:1.0.9-51.el4_8.s390x", "4Desktop:seamonkey-mail-0:1.0.9-51.el4_8.x86_64", "4ES:seamonkey-0:1.0.9-51.el4_8.i386", "4ES:seamonkey-0:1.0.9-51.el4_8.ia64", "4ES:seamonkey-0:1.0.9-51.el4_8.ppc", "4ES:seamonkey-0:1.0.9-51.el4_8.s390", "4ES:seamonkey-0:1.0.9-51.el4_8.s390x", "4ES:seamonkey-0:1.0.9-51.el4_8.src", "4ES:seamonkey-0:1.0.9-51.el4_8.x86_64", "4ES:seamonkey-chat-0:1.0.9-51.el4_8.i386", "4ES:seamonkey-chat-0:1.0.9-51.el4_8.ia64", "4ES:seamonkey-chat-0:1.0.9-51.el4_8.ppc", "4ES:seamonkey-chat-0:1.0.9-51.el4_8.s390", "4ES:seamonkey-chat-0:1.0.9-51.el4_8.s390x", "4ES:seamonkey-chat-0:1.0.9-51.el4_8.x86_64", "4ES:seamonkey-debuginfo-0:1.0.9-51.el4_8.i386", "4ES:seamonkey-debuginfo-0:1.0.9-51.el4_8.ia64", "4ES:seamonkey-debuginfo-0:1.0.9-51.el4_8.ppc", "4ES:seamonkey-debuginfo-0:1.0.9-51.el4_8.s390", "4ES:seamonkey-debuginfo-0:1.0.9-51.el4_8.s390x", "4ES:seamonkey-debuginfo-0:1.0.9-51.el4_8.x86_64", "4ES:seamonkey-devel-0:1.0.9-51.el4_8.i386", "4ES:seamonkey-devel-0:1.0.9-51.el4_8.ia64", "4ES:seamonkey-devel-0:1.0.9-51.el4_8.ppc", "4ES:seamonkey-devel-0:1.0.9-51.el4_8.s390", "4ES:seamonkey-devel-0:1.0.9-51.el4_8.s390x", "4ES:seamonkey-devel-0:1.0.9-51.el4_8.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.9-51.el4_8.i386", "4ES:seamonkey-dom-inspector-0:1.0.9-51.el4_8.ia64", "4ES:seamonkey-dom-inspector-0:1.0.9-51.el4_8.ppc", "4ES:seamonkey-dom-inspector-0:1.0.9-51.el4_8.s390", "4ES:seamonkey-dom-inspector-0:1.0.9-51.el4_8.s390x", "4ES:seamonkey-dom-inspector-0:1.0.9-51.el4_8.x86_64", "4ES:seamonkey-js-debugger-0:1.0.9-51.el4_8.i386", "4ES:seamonkey-js-debugger-0:1.0.9-51.el4_8.ia64", "4ES:seamonkey-js-debugger-0:1.0.9-51.el4_8.ppc", "4ES:seamonkey-js-debugger-0:1.0.9-51.el4_8.s390", "4ES:seamonkey-js-debugger-0:1.0.9-51.el4_8.s390x", "4ES:seamonkey-js-debugger-0:1.0.9-51.el4_8.x86_64", "4ES:seamonkey-mail-0:1.0.9-51.el4_8.i386", "4ES:seamonkey-mail-0:1.0.9-51.el4_8.ia64", "4ES:seamonkey-mail-0:1.0.9-51.el4_8.ppc", "4ES:seamonkey-mail-0:1.0.9-51.el4_8.s390", "4ES:seamonkey-mail-0:1.0.9-51.el4_8.s390x", "4ES:seamonkey-mail-0:1.0.9-51.el4_8.x86_64", "4WS:seamonkey-0:1.0.9-51.el4_8.i386", "4WS:seamonkey-0:1.0.9-51.el4_8.ia64", "4WS:seamonkey-0:1.0.9-51.el4_8.ppc", "4WS:seamonkey-0:1.0.9-51.el4_8.s390", "4WS:seamonkey-0:1.0.9-51.el4_8.s390x", "4WS:seamonkey-0:1.0.9-51.el4_8.src", "4WS:seamonkey-0:1.0.9-51.el4_8.x86_64", "4WS:seamonkey-chat-0:1.0.9-51.el4_8.i386", "4WS:seamonkey-chat-0:1.0.9-51.el4_8.ia64", "4WS:seamonkey-chat-0:1.0.9-51.el4_8.ppc", "4WS:seamonkey-chat-0:1.0.9-51.el4_8.s390", "4WS:seamonkey-chat-0:1.0.9-51.el4_8.s390x", "4WS:seamonkey-chat-0:1.0.9-51.el4_8.x86_64", "4WS:seamonkey-debuginfo-0:1.0.9-51.el4_8.i386", "4WS:seamonkey-debuginfo-0:1.0.9-51.el4_8.ia64", "4WS:seamonkey-debuginfo-0:1.0.9-51.el4_8.ppc", "4WS:seamonkey-debuginfo-0:1.0.9-51.el4_8.s390", "4WS:seamonkey-debuginfo-0:1.0.9-51.el4_8.s390x", "4WS:seamonkey-debuginfo-0:1.0.9-51.el4_8.x86_64", "4WS:seamonkey-devel-0:1.0.9-51.el4_8.i386", "4WS:seamonkey-devel-0:1.0.9-51.el4_8.ia64", "4WS:seamonkey-devel-0:1.0.9-51.el4_8.ppc", "4WS:seamonkey-devel-0:1.0.9-51.el4_8.s390", "4WS:seamonkey-devel-0:1.0.9-51.el4_8.s390x", "4WS:seamonkey-devel-0:1.0.9-51.el4_8.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.9-51.el4_8.i386", "4WS:seamonkey-dom-inspector-0:1.0.9-51.el4_8.ia64", "4WS:seamonkey-dom-inspector-0:1.0.9-51.el4_8.ppc", "4WS:seamonkey-dom-inspector-0:1.0.9-51.el4_8.s390", "4WS:seamonkey-dom-inspector-0:1.0.9-51.el4_8.s390x", "4WS:seamonkey-dom-inspector-0:1.0.9-51.el4_8.x86_64", "4WS:seamonkey-js-debugger-0:1.0.9-51.el4_8.i386", "4WS:seamonkey-js-debugger-0:1.0.9-51.el4_8.ia64", "4WS:seamonkey-js-debugger-0:1.0.9-51.el4_8.ppc", "4WS:seamonkey-js-debugger-0:1.0.9-51.el4_8.s390", "4WS:seamonkey-js-debugger-0:1.0.9-51.el4_8.s390x", "4WS:seamonkey-js-debugger-0:1.0.9-51.el4_8.x86_64", "4WS:seamonkey-mail-0:1.0.9-51.el4_8.i386", "4WS:seamonkey-mail-0:1.0.9-51.el4_8.ia64", "4WS:seamonkey-mail-0:1.0.9-51.el4_8.ppc", "4WS:seamonkey-mail-0:1.0.9-51.el4_8.s390", "4WS:seamonkey-mail-0:1.0.9-51.el4_8.s390x", "4WS:seamonkey-mail-0:1.0.9-51.el4_8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Mozilla NTLM reflection vulnerability" }, { "cve": "CVE-2009-3984", "discovery_date": "2009-12-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "546722" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox before 3.0.16 and 3.5.x before 3.5.6, and SeaMonkey before 2.0.1, allows remote attackers to spoof an SSL indicator for an http URL or a file URL by setting document.location to an https URL corresponding to a site that responds with a No Content (aka 204) status code and an empty body.", "title": "Vulnerability description" }, { "category": "summary", "text": "Mozilla SSL spoofing with document.location and empty SSL response page", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "3AS:seamonkey-0:1.0.9-0.48.el3.i386", "3AS:seamonkey-0:1.0.9-0.48.el3.ia64", "3AS:seamonkey-0:1.0.9-0.48.el3.ppc", "3AS:seamonkey-0:1.0.9-0.48.el3.s390", "3AS:seamonkey-0:1.0.9-0.48.el3.s390x", "3AS:seamonkey-0:1.0.9-0.48.el3.src", "3AS:seamonkey-0:1.0.9-0.48.el3.x86_64", "3AS:seamonkey-chat-0:1.0.9-0.48.el3.i386", "3AS:seamonkey-chat-0:1.0.9-0.48.el3.ia64", "3AS:seamonkey-chat-0:1.0.9-0.48.el3.ppc", "3AS:seamonkey-chat-0:1.0.9-0.48.el3.s390", "3AS:seamonkey-chat-0:1.0.9-0.48.el3.s390x", "3AS:seamonkey-chat-0:1.0.9-0.48.el3.x86_64", "3AS:seamonkey-debuginfo-0:1.0.9-0.48.el3.i386", "3AS:seamonkey-debuginfo-0:1.0.9-0.48.el3.ia64", "3AS:seamonkey-debuginfo-0:1.0.9-0.48.el3.ppc", "3AS:seamonkey-debuginfo-0:1.0.9-0.48.el3.s390", "3AS:seamonkey-debuginfo-0:1.0.9-0.48.el3.s390x", "3AS:seamonkey-debuginfo-0:1.0.9-0.48.el3.x86_64", "3AS:seamonkey-devel-0:1.0.9-0.48.el3.i386", "3AS:seamonkey-devel-0:1.0.9-0.48.el3.ia64", "3AS:seamonkey-devel-0:1.0.9-0.48.el3.ppc", "3AS:seamonkey-devel-0:1.0.9-0.48.el3.s390", "3AS:seamonkey-devel-0:1.0.9-0.48.el3.s390x", "3AS:seamonkey-devel-0:1.0.9-0.48.el3.x86_64", "3AS:seamonkey-dom-inspector-0:1.0.9-0.48.el3.i386", "3AS:seamonkey-dom-inspector-0:1.0.9-0.48.el3.ia64", "3AS:seamonkey-dom-inspector-0:1.0.9-0.48.el3.ppc", "3AS:seamonkey-dom-inspector-0:1.0.9-0.48.el3.s390", "3AS:seamonkey-dom-inspector-0:1.0.9-0.48.el3.s390x", "3AS:seamonkey-dom-inspector-0:1.0.9-0.48.el3.x86_64", "3AS:seamonkey-js-debugger-0:1.0.9-0.48.el3.i386", "3AS:seamonkey-js-debugger-0:1.0.9-0.48.el3.ia64", "3AS:seamonkey-js-debugger-0:1.0.9-0.48.el3.ppc", "3AS:seamonkey-js-debugger-0:1.0.9-0.48.el3.s390", "3AS:seamonkey-js-debugger-0:1.0.9-0.48.el3.s390x", "3AS:seamonkey-js-debugger-0:1.0.9-0.48.el3.x86_64", "3AS:seamonkey-mail-0:1.0.9-0.48.el3.i386", "3AS:seamonkey-mail-0:1.0.9-0.48.el3.ia64", "3AS:seamonkey-mail-0:1.0.9-0.48.el3.ppc", "3AS:seamonkey-mail-0:1.0.9-0.48.el3.s390", "3AS:seamonkey-mail-0:1.0.9-0.48.el3.s390x", "3AS:seamonkey-mail-0:1.0.9-0.48.el3.x86_64", "3AS:seamonkey-nspr-0:1.0.9-0.48.el3.i386", "3AS:seamonkey-nspr-0:1.0.9-0.48.el3.ia64", "3AS:seamonkey-nspr-0:1.0.9-0.48.el3.ppc", "3AS:seamonkey-nspr-0:1.0.9-0.48.el3.s390", "3AS:seamonkey-nspr-0:1.0.9-0.48.el3.s390x", "3AS:seamonkey-nspr-0:1.0.9-0.48.el3.x86_64", "3AS:seamonkey-nspr-devel-0:1.0.9-0.48.el3.i386", "3AS:seamonkey-nspr-devel-0:1.0.9-0.48.el3.ia64", "3AS:seamonkey-nspr-devel-0:1.0.9-0.48.el3.ppc", "3AS:seamonkey-nspr-devel-0:1.0.9-0.48.el3.s390", "3AS:seamonkey-nspr-devel-0:1.0.9-0.48.el3.s390x", "3AS:seamonkey-nspr-devel-0:1.0.9-0.48.el3.x86_64", "3AS:seamonkey-nss-0:1.0.9-0.48.el3.i386", "3AS:seamonkey-nss-0:1.0.9-0.48.el3.ia64", "3AS:seamonkey-nss-0:1.0.9-0.48.el3.ppc", "3AS:seamonkey-nss-0:1.0.9-0.48.el3.s390", "3AS:seamonkey-nss-0:1.0.9-0.48.el3.s390x", "3AS:seamonkey-nss-0:1.0.9-0.48.el3.x86_64", "3AS:seamonkey-nss-devel-0:1.0.9-0.48.el3.i386", "3AS:seamonkey-nss-devel-0:1.0.9-0.48.el3.ia64", "3AS:seamonkey-nss-devel-0:1.0.9-0.48.el3.ppc", "3AS:seamonkey-nss-devel-0:1.0.9-0.48.el3.s390", "3AS:seamonkey-nss-devel-0:1.0.9-0.48.el3.s390x", "3AS:seamonkey-nss-devel-0:1.0.9-0.48.el3.x86_64", "3Desktop:seamonkey-0:1.0.9-0.48.el3.i386", "3Desktop:seamonkey-0:1.0.9-0.48.el3.ia64", "3Desktop:seamonkey-0:1.0.9-0.48.el3.ppc", "3Desktop:seamonkey-0:1.0.9-0.48.el3.s390", "3Desktop:seamonkey-0:1.0.9-0.48.el3.s390x", "3Desktop:seamonkey-0:1.0.9-0.48.el3.src", "3Desktop:seamonkey-0:1.0.9-0.48.el3.x86_64", "3Desktop:seamonkey-chat-0:1.0.9-0.48.el3.i386", "3Desktop:seamonkey-chat-0:1.0.9-0.48.el3.ia64", "3Desktop:seamonkey-chat-0:1.0.9-0.48.el3.ppc", "3Desktop:seamonkey-chat-0:1.0.9-0.48.el3.s390", "3Desktop:seamonkey-chat-0:1.0.9-0.48.el3.s390x", "3Desktop:seamonkey-chat-0:1.0.9-0.48.el3.x86_64", "3Desktop:seamonkey-debuginfo-0:1.0.9-0.48.el3.i386", "3Desktop:seamonkey-debuginfo-0:1.0.9-0.48.el3.ia64", "3Desktop:seamonkey-debuginfo-0:1.0.9-0.48.el3.ppc", "3Desktop:seamonkey-debuginfo-0:1.0.9-0.48.el3.s390", "3Desktop:seamonkey-debuginfo-0:1.0.9-0.48.el3.s390x", "3Desktop:seamonkey-debuginfo-0:1.0.9-0.48.el3.x86_64", "3Desktop:seamonkey-devel-0:1.0.9-0.48.el3.i386", "3Desktop:seamonkey-devel-0:1.0.9-0.48.el3.ia64", "3Desktop:seamonkey-devel-0:1.0.9-0.48.el3.ppc", "3Desktop:seamonkey-devel-0:1.0.9-0.48.el3.s390", "3Desktop:seamonkey-devel-0:1.0.9-0.48.el3.s390x", "3Desktop:seamonkey-devel-0:1.0.9-0.48.el3.x86_64", "3Desktop:seamonkey-dom-inspector-0:1.0.9-0.48.el3.i386", "3Desktop:seamonkey-dom-inspector-0:1.0.9-0.48.el3.ia64", "3Desktop:seamonkey-dom-inspector-0:1.0.9-0.48.el3.ppc", "3Desktop:seamonkey-dom-inspector-0:1.0.9-0.48.el3.s390", "3Desktop:seamonkey-dom-inspector-0:1.0.9-0.48.el3.s390x", "3Desktop:seamonkey-dom-inspector-0:1.0.9-0.48.el3.x86_64", "3Desktop:seamonkey-js-debugger-0:1.0.9-0.48.el3.i386", "3Desktop:seamonkey-js-debugger-0:1.0.9-0.48.el3.ia64", "3Desktop:seamonkey-js-debugger-0:1.0.9-0.48.el3.ppc", "3Desktop:seamonkey-js-debugger-0:1.0.9-0.48.el3.s390", "3Desktop:seamonkey-js-debugger-0:1.0.9-0.48.el3.s390x", "3Desktop:seamonkey-js-debugger-0:1.0.9-0.48.el3.x86_64", "3Desktop:seamonkey-mail-0:1.0.9-0.48.el3.i386", "3Desktop:seamonkey-mail-0:1.0.9-0.48.el3.ia64", "3Desktop:seamonkey-mail-0:1.0.9-0.48.el3.ppc", "3Desktop:seamonkey-mail-0:1.0.9-0.48.el3.s390", "3Desktop:seamonkey-mail-0:1.0.9-0.48.el3.s390x", "3Desktop:seamonkey-mail-0:1.0.9-0.48.el3.x86_64", "3Desktop:seamonkey-nspr-0:1.0.9-0.48.el3.i386", "3Desktop:seamonkey-nspr-0:1.0.9-0.48.el3.ia64", "3Desktop:seamonkey-nspr-0:1.0.9-0.48.el3.ppc", "3Desktop:seamonkey-nspr-0:1.0.9-0.48.el3.s390", "3Desktop:seamonkey-nspr-0:1.0.9-0.48.el3.s390x", "3Desktop:seamonkey-nspr-0:1.0.9-0.48.el3.x86_64", "3Desktop:seamonkey-nspr-devel-0:1.0.9-0.48.el3.i386", "3Desktop:seamonkey-nspr-devel-0:1.0.9-0.48.el3.ia64", "3Desktop:seamonkey-nspr-devel-0:1.0.9-0.48.el3.ppc", "3Desktop:seamonkey-nspr-devel-0:1.0.9-0.48.el3.s390", "3Desktop:seamonkey-nspr-devel-0:1.0.9-0.48.el3.s390x", "3Desktop:seamonkey-nspr-devel-0:1.0.9-0.48.el3.x86_64", "3Desktop:seamonkey-nss-0:1.0.9-0.48.el3.i386", "3Desktop:seamonkey-nss-0:1.0.9-0.48.el3.ia64", "3Desktop:seamonkey-nss-0:1.0.9-0.48.el3.ppc", "3Desktop:seamonkey-nss-0:1.0.9-0.48.el3.s390", "3Desktop:seamonkey-nss-0:1.0.9-0.48.el3.s390x", "3Desktop:seamonkey-nss-0:1.0.9-0.48.el3.x86_64", "3Desktop:seamonkey-nss-devel-0:1.0.9-0.48.el3.i386", "3Desktop:seamonkey-nss-devel-0:1.0.9-0.48.el3.ia64", "3Desktop:seamonkey-nss-devel-0:1.0.9-0.48.el3.ppc", "3Desktop:seamonkey-nss-devel-0:1.0.9-0.48.el3.s390", "3Desktop:seamonkey-nss-devel-0:1.0.9-0.48.el3.s390x", "3Desktop:seamonkey-nss-devel-0:1.0.9-0.48.el3.x86_64", "3ES:seamonkey-0:1.0.9-0.48.el3.i386", "3ES:seamonkey-0:1.0.9-0.48.el3.ia64", "3ES:seamonkey-0:1.0.9-0.48.el3.ppc", "3ES:seamonkey-0:1.0.9-0.48.el3.s390", "3ES:seamonkey-0:1.0.9-0.48.el3.s390x", "3ES:seamonkey-0:1.0.9-0.48.el3.src", "3ES:seamonkey-0:1.0.9-0.48.el3.x86_64", "3ES:seamonkey-chat-0:1.0.9-0.48.el3.i386", "3ES:seamonkey-chat-0:1.0.9-0.48.el3.ia64", "3ES:seamonkey-chat-0:1.0.9-0.48.el3.ppc", "3ES:seamonkey-chat-0:1.0.9-0.48.el3.s390", "3ES:seamonkey-chat-0:1.0.9-0.48.el3.s390x", "3ES:seamonkey-chat-0:1.0.9-0.48.el3.x86_64", "3ES:seamonkey-debuginfo-0:1.0.9-0.48.el3.i386", "3ES:seamonkey-debuginfo-0:1.0.9-0.48.el3.ia64", "3ES:seamonkey-debuginfo-0:1.0.9-0.48.el3.ppc", "3ES:seamonkey-debuginfo-0:1.0.9-0.48.el3.s390", "3ES:seamonkey-debuginfo-0:1.0.9-0.48.el3.s390x", "3ES:seamonkey-debuginfo-0:1.0.9-0.48.el3.x86_64", "3ES:seamonkey-devel-0:1.0.9-0.48.el3.i386", "3ES:seamonkey-devel-0:1.0.9-0.48.el3.ia64", "3ES:seamonkey-devel-0:1.0.9-0.48.el3.ppc", "3ES:seamonkey-devel-0:1.0.9-0.48.el3.s390", "3ES:seamonkey-devel-0:1.0.9-0.48.el3.s390x", "3ES:seamonkey-devel-0:1.0.9-0.48.el3.x86_64", "3ES:seamonkey-dom-inspector-0:1.0.9-0.48.el3.i386", "3ES:seamonkey-dom-inspector-0:1.0.9-0.48.el3.ia64", "3ES:seamonkey-dom-inspector-0:1.0.9-0.48.el3.ppc", "3ES:seamonkey-dom-inspector-0:1.0.9-0.48.el3.s390", "3ES:seamonkey-dom-inspector-0:1.0.9-0.48.el3.s390x", "3ES:seamonkey-dom-inspector-0:1.0.9-0.48.el3.x86_64", "3ES:seamonkey-js-debugger-0:1.0.9-0.48.el3.i386", "3ES:seamonkey-js-debugger-0:1.0.9-0.48.el3.ia64", "3ES:seamonkey-js-debugger-0:1.0.9-0.48.el3.ppc", "3ES:seamonkey-js-debugger-0:1.0.9-0.48.el3.s390", "3ES:seamonkey-js-debugger-0:1.0.9-0.48.el3.s390x", "3ES:seamonkey-js-debugger-0:1.0.9-0.48.el3.x86_64", "3ES:seamonkey-mail-0:1.0.9-0.48.el3.i386", "3ES:seamonkey-mail-0:1.0.9-0.48.el3.ia64", "3ES:seamonkey-mail-0:1.0.9-0.48.el3.ppc", "3ES:seamonkey-mail-0:1.0.9-0.48.el3.s390", "3ES:seamonkey-mail-0:1.0.9-0.48.el3.s390x", "3ES:seamonkey-mail-0:1.0.9-0.48.el3.x86_64", "3ES:seamonkey-nspr-0:1.0.9-0.48.el3.i386", "3ES:seamonkey-nspr-0:1.0.9-0.48.el3.ia64", "3ES:seamonkey-nspr-0:1.0.9-0.48.el3.ppc", "3ES:seamonkey-nspr-0:1.0.9-0.48.el3.s390", "3ES:seamonkey-nspr-0:1.0.9-0.48.el3.s390x", "3ES:seamonkey-nspr-0:1.0.9-0.48.el3.x86_64", "3ES:seamonkey-nspr-devel-0:1.0.9-0.48.el3.i386", "3ES:seamonkey-nspr-devel-0:1.0.9-0.48.el3.ia64", "3ES:seamonkey-nspr-devel-0:1.0.9-0.48.el3.ppc", "3ES:seamonkey-nspr-devel-0:1.0.9-0.48.el3.s390", "3ES:seamonkey-nspr-devel-0:1.0.9-0.48.el3.s390x", "3ES:seamonkey-nspr-devel-0:1.0.9-0.48.el3.x86_64", "3ES:seamonkey-nss-0:1.0.9-0.48.el3.i386", "3ES:seamonkey-nss-0:1.0.9-0.48.el3.ia64", "3ES:seamonkey-nss-0:1.0.9-0.48.el3.ppc", "3ES:seamonkey-nss-0:1.0.9-0.48.el3.s390", "3ES:seamonkey-nss-0:1.0.9-0.48.el3.s390x", "3ES:seamonkey-nss-0:1.0.9-0.48.el3.x86_64", "3ES:seamonkey-nss-devel-0:1.0.9-0.48.el3.i386", "3ES:seamonkey-nss-devel-0:1.0.9-0.48.el3.ia64", "3ES:seamonkey-nss-devel-0:1.0.9-0.48.el3.ppc", "3ES:seamonkey-nss-devel-0:1.0.9-0.48.el3.s390", "3ES:seamonkey-nss-devel-0:1.0.9-0.48.el3.s390x", "3ES:seamonkey-nss-devel-0:1.0.9-0.48.el3.x86_64", "3WS:seamonkey-0:1.0.9-0.48.el3.i386", "3WS:seamonkey-0:1.0.9-0.48.el3.ia64", "3WS:seamonkey-0:1.0.9-0.48.el3.ppc", "3WS:seamonkey-0:1.0.9-0.48.el3.s390", "3WS:seamonkey-0:1.0.9-0.48.el3.s390x", "3WS:seamonkey-0:1.0.9-0.48.el3.src", "3WS:seamonkey-0:1.0.9-0.48.el3.x86_64", "3WS:seamonkey-chat-0:1.0.9-0.48.el3.i386", "3WS:seamonkey-chat-0:1.0.9-0.48.el3.ia64", "3WS:seamonkey-chat-0:1.0.9-0.48.el3.ppc", "3WS:seamonkey-chat-0:1.0.9-0.48.el3.s390", "3WS:seamonkey-chat-0:1.0.9-0.48.el3.s390x", "3WS:seamonkey-chat-0:1.0.9-0.48.el3.x86_64", "3WS:seamonkey-debuginfo-0:1.0.9-0.48.el3.i386", "3WS:seamonkey-debuginfo-0:1.0.9-0.48.el3.ia64", "3WS:seamonkey-debuginfo-0:1.0.9-0.48.el3.ppc", "3WS:seamonkey-debuginfo-0:1.0.9-0.48.el3.s390", "3WS:seamonkey-debuginfo-0:1.0.9-0.48.el3.s390x", "3WS:seamonkey-debuginfo-0:1.0.9-0.48.el3.x86_64", "3WS:seamonkey-devel-0:1.0.9-0.48.el3.i386", "3WS:seamonkey-devel-0:1.0.9-0.48.el3.ia64", "3WS:seamonkey-devel-0:1.0.9-0.48.el3.ppc", "3WS:seamonkey-devel-0:1.0.9-0.48.el3.s390", "3WS:seamonkey-devel-0:1.0.9-0.48.el3.s390x", "3WS:seamonkey-devel-0:1.0.9-0.48.el3.x86_64", "3WS:seamonkey-dom-inspector-0:1.0.9-0.48.el3.i386", "3WS:seamonkey-dom-inspector-0:1.0.9-0.48.el3.ia64", "3WS:seamonkey-dom-inspector-0:1.0.9-0.48.el3.ppc", "3WS:seamonkey-dom-inspector-0:1.0.9-0.48.el3.s390", "3WS:seamonkey-dom-inspector-0:1.0.9-0.48.el3.s390x", "3WS:seamonkey-dom-inspector-0:1.0.9-0.48.el3.x86_64", "3WS:seamonkey-js-debugger-0:1.0.9-0.48.el3.i386", "3WS:seamonkey-js-debugger-0:1.0.9-0.48.el3.ia64", "3WS:seamonkey-js-debugger-0:1.0.9-0.48.el3.ppc", "3WS:seamonkey-js-debugger-0:1.0.9-0.48.el3.s390", "3WS:seamonkey-js-debugger-0:1.0.9-0.48.el3.s390x", "3WS:seamonkey-js-debugger-0:1.0.9-0.48.el3.x86_64", "3WS:seamonkey-mail-0:1.0.9-0.48.el3.i386", "3WS:seamonkey-mail-0:1.0.9-0.48.el3.ia64", "3WS:seamonkey-mail-0:1.0.9-0.48.el3.ppc", "3WS:seamonkey-mail-0:1.0.9-0.48.el3.s390", "3WS:seamonkey-mail-0:1.0.9-0.48.el3.s390x", "3WS:seamonkey-mail-0:1.0.9-0.48.el3.x86_64", "3WS:seamonkey-nspr-0:1.0.9-0.48.el3.i386", "3WS:seamonkey-nspr-0:1.0.9-0.48.el3.ia64", "3WS:seamonkey-nspr-0:1.0.9-0.48.el3.ppc", "3WS:seamonkey-nspr-0:1.0.9-0.48.el3.s390", "3WS:seamonkey-nspr-0:1.0.9-0.48.el3.s390x", "3WS:seamonkey-nspr-0:1.0.9-0.48.el3.x86_64", "3WS:seamonkey-nspr-devel-0:1.0.9-0.48.el3.i386", "3WS:seamonkey-nspr-devel-0:1.0.9-0.48.el3.ia64", "3WS:seamonkey-nspr-devel-0:1.0.9-0.48.el3.ppc", "3WS:seamonkey-nspr-devel-0:1.0.9-0.48.el3.s390", "3WS:seamonkey-nspr-devel-0:1.0.9-0.48.el3.s390x", "3WS:seamonkey-nspr-devel-0:1.0.9-0.48.el3.x86_64", "3WS:seamonkey-nss-0:1.0.9-0.48.el3.i386", "3WS:seamonkey-nss-0:1.0.9-0.48.el3.ia64", "3WS:seamonkey-nss-0:1.0.9-0.48.el3.ppc", "3WS:seamonkey-nss-0:1.0.9-0.48.el3.s390", "3WS:seamonkey-nss-0:1.0.9-0.48.el3.s390x", "3WS:seamonkey-nss-0:1.0.9-0.48.el3.x86_64", "3WS:seamonkey-nss-devel-0:1.0.9-0.48.el3.i386", "3WS:seamonkey-nss-devel-0:1.0.9-0.48.el3.ia64", "3WS:seamonkey-nss-devel-0:1.0.9-0.48.el3.ppc", "3WS:seamonkey-nss-devel-0:1.0.9-0.48.el3.s390", "3WS:seamonkey-nss-devel-0:1.0.9-0.48.el3.s390x", "3WS:seamonkey-nss-devel-0:1.0.9-0.48.el3.x86_64", "4AS:seamonkey-0:1.0.9-51.el4_8.i386", "4AS:seamonkey-0:1.0.9-51.el4_8.ia64", "4AS:seamonkey-0:1.0.9-51.el4_8.ppc", "4AS:seamonkey-0:1.0.9-51.el4_8.s390", "4AS:seamonkey-0:1.0.9-51.el4_8.s390x", "4AS:seamonkey-0:1.0.9-51.el4_8.src", "4AS:seamonkey-0:1.0.9-51.el4_8.x86_64", "4AS:seamonkey-chat-0:1.0.9-51.el4_8.i386", "4AS:seamonkey-chat-0:1.0.9-51.el4_8.ia64", "4AS:seamonkey-chat-0:1.0.9-51.el4_8.ppc", "4AS:seamonkey-chat-0:1.0.9-51.el4_8.s390", "4AS:seamonkey-chat-0:1.0.9-51.el4_8.s390x", "4AS:seamonkey-chat-0:1.0.9-51.el4_8.x86_64", "4AS:seamonkey-debuginfo-0:1.0.9-51.el4_8.i386", "4AS:seamonkey-debuginfo-0:1.0.9-51.el4_8.ia64", "4AS:seamonkey-debuginfo-0:1.0.9-51.el4_8.ppc", "4AS:seamonkey-debuginfo-0:1.0.9-51.el4_8.s390", "4AS:seamonkey-debuginfo-0:1.0.9-51.el4_8.s390x", "4AS:seamonkey-debuginfo-0:1.0.9-51.el4_8.x86_64", "4AS:seamonkey-devel-0:1.0.9-51.el4_8.i386", "4AS:seamonkey-devel-0:1.0.9-51.el4_8.ia64", "4AS:seamonkey-devel-0:1.0.9-51.el4_8.ppc", "4AS:seamonkey-devel-0:1.0.9-51.el4_8.s390", "4AS:seamonkey-devel-0:1.0.9-51.el4_8.s390x", "4AS:seamonkey-devel-0:1.0.9-51.el4_8.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.9-51.el4_8.i386", "4AS:seamonkey-dom-inspector-0:1.0.9-51.el4_8.ia64", "4AS:seamonkey-dom-inspector-0:1.0.9-51.el4_8.ppc", "4AS:seamonkey-dom-inspector-0:1.0.9-51.el4_8.s390", "4AS:seamonkey-dom-inspector-0:1.0.9-51.el4_8.s390x", "4AS:seamonkey-dom-inspector-0:1.0.9-51.el4_8.x86_64", "4AS:seamonkey-js-debugger-0:1.0.9-51.el4_8.i386", "4AS:seamonkey-js-debugger-0:1.0.9-51.el4_8.ia64", "4AS:seamonkey-js-debugger-0:1.0.9-51.el4_8.ppc", "4AS:seamonkey-js-debugger-0:1.0.9-51.el4_8.s390", "4AS:seamonkey-js-debugger-0:1.0.9-51.el4_8.s390x", "4AS:seamonkey-js-debugger-0:1.0.9-51.el4_8.x86_64", "4AS:seamonkey-mail-0:1.0.9-51.el4_8.i386", "4AS:seamonkey-mail-0:1.0.9-51.el4_8.ia64", "4AS:seamonkey-mail-0:1.0.9-51.el4_8.ppc", "4AS:seamonkey-mail-0:1.0.9-51.el4_8.s390", "4AS:seamonkey-mail-0:1.0.9-51.el4_8.s390x", "4AS:seamonkey-mail-0:1.0.9-51.el4_8.x86_64", "4Desktop:seamonkey-0:1.0.9-51.el4_8.i386", "4Desktop:seamonkey-0:1.0.9-51.el4_8.ia64", "4Desktop:seamonkey-0:1.0.9-51.el4_8.ppc", "4Desktop:seamonkey-0:1.0.9-51.el4_8.s390", "4Desktop:seamonkey-0:1.0.9-51.el4_8.s390x", "4Desktop:seamonkey-0:1.0.9-51.el4_8.src", "4Desktop:seamonkey-0:1.0.9-51.el4_8.x86_64", "4Desktop:seamonkey-chat-0:1.0.9-51.el4_8.i386", "4Desktop:seamonkey-chat-0:1.0.9-51.el4_8.ia64", "4Desktop:seamonkey-chat-0:1.0.9-51.el4_8.ppc", "4Desktop:seamonkey-chat-0:1.0.9-51.el4_8.s390", "4Desktop:seamonkey-chat-0:1.0.9-51.el4_8.s390x", "4Desktop:seamonkey-chat-0:1.0.9-51.el4_8.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.9-51.el4_8.i386", "4Desktop:seamonkey-debuginfo-0:1.0.9-51.el4_8.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.9-51.el4_8.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.9-51.el4_8.s390", "4Desktop:seamonkey-debuginfo-0:1.0.9-51.el4_8.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.9-51.el4_8.x86_64", "4Desktop:seamonkey-devel-0:1.0.9-51.el4_8.i386", "4Desktop:seamonkey-devel-0:1.0.9-51.el4_8.ia64", "4Desktop:seamonkey-devel-0:1.0.9-51.el4_8.ppc", "4Desktop:seamonkey-devel-0:1.0.9-51.el4_8.s390", "4Desktop:seamonkey-devel-0:1.0.9-51.el4_8.s390x", "4Desktop:seamonkey-devel-0:1.0.9-51.el4_8.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.9-51.el4_8.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.9-51.el4_8.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.9-51.el4_8.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.9-51.el4_8.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.9-51.el4_8.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.9-51.el4_8.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.9-51.el4_8.i386", "4Desktop:seamonkey-js-debugger-0:1.0.9-51.el4_8.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.9-51.el4_8.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.9-51.el4_8.s390", "4Desktop:seamonkey-js-debugger-0:1.0.9-51.el4_8.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.9-51.el4_8.x86_64", "4Desktop:seamonkey-mail-0:1.0.9-51.el4_8.i386", "4Desktop:seamonkey-mail-0:1.0.9-51.el4_8.ia64", "4Desktop:seamonkey-mail-0:1.0.9-51.el4_8.ppc", "4Desktop:seamonkey-mail-0:1.0.9-51.el4_8.s390", "4Desktop:seamonkey-mail-0:1.0.9-51.el4_8.s390x", "4Desktop:seamonkey-mail-0:1.0.9-51.el4_8.x86_64", "4ES:seamonkey-0:1.0.9-51.el4_8.i386", "4ES:seamonkey-0:1.0.9-51.el4_8.ia64", "4ES:seamonkey-0:1.0.9-51.el4_8.ppc", "4ES:seamonkey-0:1.0.9-51.el4_8.s390", "4ES:seamonkey-0:1.0.9-51.el4_8.s390x", "4ES:seamonkey-0:1.0.9-51.el4_8.src", "4ES:seamonkey-0:1.0.9-51.el4_8.x86_64", "4ES:seamonkey-chat-0:1.0.9-51.el4_8.i386", "4ES:seamonkey-chat-0:1.0.9-51.el4_8.ia64", "4ES:seamonkey-chat-0:1.0.9-51.el4_8.ppc", "4ES:seamonkey-chat-0:1.0.9-51.el4_8.s390", "4ES:seamonkey-chat-0:1.0.9-51.el4_8.s390x", "4ES:seamonkey-chat-0:1.0.9-51.el4_8.x86_64", "4ES:seamonkey-debuginfo-0:1.0.9-51.el4_8.i386", "4ES:seamonkey-debuginfo-0:1.0.9-51.el4_8.ia64", "4ES:seamonkey-debuginfo-0:1.0.9-51.el4_8.ppc", "4ES:seamonkey-debuginfo-0:1.0.9-51.el4_8.s390", "4ES:seamonkey-debuginfo-0:1.0.9-51.el4_8.s390x", "4ES:seamonkey-debuginfo-0:1.0.9-51.el4_8.x86_64", "4ES:seamonkey-devel-0:1.0.9-51.el4_8.i386", "4ES:seamonkey-devel-0:1.0.9-51.el4_8.ia64", "4ES:seamonkey-devel-0:1.0.9-51.el4_8.ppc", "4ES:seamonkey-devel-0:1.0.9-51.el4_8.s390", "4ES:seamonkey-devel-0:1.0.9-51.el4_8.s390x", "4ES:seamonkey-devel-0:1.0.9-51.el4_8.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.9-51.el4_8.i386", "4ES:seamonkey-dom-inspector-0:1.0.9-51.el4_8.ia64", "4ES:seamonkey-dom-inspector-0:1.0.9-51.el4_8.ppc", "4ES:seamonkey-dom-inspector-0:1.0.9-51.el4_8.s390", "4ES:seamonkey-dom-inspector-0:1.0.9-51.el4_8.s390x", "4ES:seamonkey-dom-inspector-0:1.0.9-51.el4_8.x86_64", "4ES:seamonkey-js-debugger-0:1.0.9-51.el4_8.i386", "4ES:seamonkey-js-debugger-0:1.0.9-51.el4_8.ia64", "4ES:seamonkey-js-debugger-0:1.0.9-51.el4_8.ppc", "4ES:seamonkey-js-debugger-0:1.0.9-51.el4_8.s390", "4ES:seamonkey-js-debugger-0:1.0.9-51.el4_8.s390x", "4ES:seamonkey-js-debugger-0:1.0.9-51.el4_8.x86_64", "4ES:seamonkey-mail-0:1.0.9-51.el4_8.i386", "4ES:seamonkey-mail-0:1.0.9-51.el4_8.ia64", "4ES:seamonkey-mail-0:1.0.9-51.el4_8.ppc", "4ES:seamonkey-mail-0:1.0.9-51.el4_8.s390", "4ES:seamonkey-mail-0:1.0.9-51.el4_8.s390x", "4ES:seamonkey-mail-0:1.0.9-51.el4_8.x86_64", "4WS:seamonkey-0:1.0.9-51.el4_8.i386", "4WS:seamonkey-0:1.0.9-51.el4_8.ia64", "4WS:seamonkey-0:1.0.9-51.el4_8.ppc", "4WS:seamonkey-0:1.0.9-51.el4_8.s390", "4WS:seamonkey-0:1.0.9-51.el4_8.s390x", "4WS:seamonkey-0:1.0.9-51.el4_8.src", "4WS:seamonkey-0:1.0.9-51.el4_8.x86_64", "4WS:seamonkey-chat-0:1.0.9-51.el4_8.i386", "4WS:seamonkey-chat-0:1.0.9-51.el4_8.ia64", "4WS:seamonkey-chat-0:1.0.9-51.el4_8.ppc", "4WS:seamonkey-chat-0:1.0.9-51.el4_8.s390", "4WS:seamonkey-chat-0:1.0.9-51.el4_8.s390x", "4WS:seamonkey-chat-0:1.0.9-51.el4_8.x86_64", "4WS:seamonkey-debuginfo-0:1.0.9-51.el4_8.i386", "4WS:seamonkey-debuginfo-0:1.0.9-51.el4_8.ia64", "4WS:seamonkey-debuginfo-0:1.0.9-51.el4_8.ppc", "4WS:seamonkey-debuginfo-0:1.0.9-51.el4_8.s390", "4WS:seamonkey-debuginfo-0:1.0.9-51.el4_8.s390x", "4WS:seamonkey-debuginfo-0:1.0.9-51.el4_8.x86_64", "4WS:seamonkey-devel-0:1.0.9-51.el4_8.i386", "4WS:seamonkey-devel-0:1.0.9-51.el4_8.ia64", "4WS:seamonkey-devel-0:1.0.9-51.el4_8.ppc", "4WS:seamonkey-devel-0:1.0.9-51.el4_8.s390", "4WS:seamonkey-devel-0:1.0.9-51.el4_8.s390x", "4WS:seamonkey-devel-0:1.0.9-51.el4_8.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.9-51.el4_8.i386", "4WS:seamonkey-dom-inspector-0:1.0.9-51.el4_8.ia64", "4WS:seamonkey-dom-inspector-0:1.0.9-51.el4_8.ppc", "4WS:seamonkey-dom-inspector-0:1.0.9-51.el4_8.s390", "4WS:seamonkey-dom-inspector-0:1.0.9-51.el4_8.s390x", "4WS:seamonkey-dom-inspector-0:1.0.9-51.el4_8.x86_64", "4WS:seamonkey-js-debugger-0:1.0.9-51.el4_8.i386", "4WS:seamonkey-js-debugger-0:1.0.9-51.el4_8.ia64", "4WS:seamonkey-js-debugger-0:1.0.9-51.el4_8.ppc", "4WS:seamonkey-js-debugger-0:1.0.9-51.el4_8.s390", "4WS:seamonkey-js-debugger-0:1.0.9-51.el4_8.s390x", "4WS:seamonkey-js-debugger-0:1.0.9-51.el4_8.x86_64", "4WS:seamonkey-mail-0:1.0.9-51.el4_8.i386", "4WS:seamonkey-mail-0:1.0.9-51.el4_8.ia64", "4WS:seamonkey-mail-0:1.0.9-51.el4_8.ppc", "4WS:seamonkey-mail-0:1.0.9-51.el4_8.s390", "4WS:seamonkey-mail-0:1.0.9-51.el4_8.s390x", "4WS:seamonkey-mail-0:1.0.9-51.el4_8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-3984" }, { "category": "external", "summary": "RHBZ#546722", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=546722" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3984", "url": "https://www.cve.org/CVERecord?id=CVE-2009-3984" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3984", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3984" } ], "release_date": "2009-12-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-12-16T04:33:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "3AS:seamonkey-0:1.0.9-0.48.el3.i386", "3AS:seamonkey-0:1.0.9-0.48.el3.ia64", "3AS:seamonkey-0:1.0.9-0.48.el3.ppc", "3AS:seamonkey-0:1.0.9-0.48.el3.s390", "3AS:seamonkey-0:1.0.9-0.48.el3.s390x", "3AS:seamonkey-0:1.0.9-0.48.el3.src", "3AS:seamonkey-0:1.0.9-0.48.el3.x86_64", "3AS:seamonkey-chat-0:1.0.9-0.48.el3.i386", "3AS:seamonkey-chat-0:1.0.9-0.48.el3.ia64", "3AS:seamonkey-chat-0:1.0.9-0.48.el3.ppc", "3AS:seamonkey-chat-0:1.0.9-0.48.el3.s390", "3AS:seamonkey-chat-0:1.0.9-0.48.el3.s390x", "3AS:seamonkey-chat-0:1.0.9-0.48.el3.x86_64", "3AS:seamonkey-debuginfo-0:1.0.9-0.48.el3.i386", "3AS:seamonkey-debuginfo-0:1.0.9-0.48.el3.ia64", "3AS:seamonkey-debuginfo-0:1.0.9-0.48.el3.ppc", "3AS:seamonkey-debuginfo-0:1.0.9-0.48.el3.s390", "3AS:seamonkey-debuginfo-0:1.0.9-0.48.el3.s390x", "3AS:seamonkey-debuginfo-0:1.0.9-0.48.el3.x86_64", "3AS:seamonkey-devel-0:1.0.9-0.48.el3.i386", "3AS:seamonkey-devel-0:1.0.9-0.48.el3.ia64", "3AS:seamonkey-devel-0:1.0.9-0.48.el3.ppc", "3AS:seamonkey-devel-0:1.0.9-0.48.el3.s390", "3AS:seamonkey-devel-0:1.0.9-0.48.el3.s390x", "3AS:seamonkey-devel-0:1.0.9-0.48.el3.x86_64", "3AS:seamonkey-dom-inspector-0:1.0.9-0.48.el3.i386", "3AS:seamonkey-dom-inspector-0:1.0.9-0.48.el3.ia64", "3AS:seamonkey-dom-inspector-0:1.0.9-0.48.el3.ppc", "3AS:seamonkey-dom-inspector-0:1.0.9-0.48.el3.s390", "3AS:seamonkey-dom-inspector-0:1.0.9-0.48.el3.s390x", "3AS:seamonkey-dom-inspector-0:1.0.9-0.48.el3.x86_64", "3AS:seamonkey-js-debugger-0:1.0.9-0.48.el3.i386", "3AS:seamonkey-js-debugger-0:1.0.9-0.48.el3.ia64", "3AS:seamonkey-js-debugger-0:1.0.9-0.48.el3.ppc", "3AS:seamonkey-js-debugger-0:1.0.9-0.48.el3.s390", "3AS:seamonkey-js-debugger-0:1.0.9-0.48.el3.s390x", "3AS:seamonkey-js-debugger-0:1.0.9-0.48.el3.x86_64", "3AS:seamonkey-mail-0:1.0.9-0.48.el3.i386", "3AS:seamonkey-mail-0:1.0.9-0.48.el3.ia64", "3AS:seamonkey-mail-0:1.0.9-0.48.el3.ppc", "3AS:seamonkey-mail-0:1.0.9-0.48.el3.s390", "3AS:seamonkey-mail-0:1.0.9-0.48.el3.s390x", "3AS:seamonkey-mail-0:1.0.9-0.48.el3.x86_64", "3AS:seamonkey-nspr-0:1.0.9-0.48.el3.i386", "3AS:seamonkey-nspr-0:1.0.9-0.48.el3.ia64", "3AS:seamonkey-nspr-0:1.0.9-0.48.el3.ppc", "3AS:seamonkey-nspr-0:1.0.9-0.48.el3.s390", "3AS:seamonkey-nspr-0:1.0.9-0.48.el3.s390x", "3AS:seamonkey-nspr-0:1.0.9-0.48.el3.x86_64", "3AS:seamonkey-nspr-devel-0:1.0.9-0.48.el3.i386", "3AS:seamonkey-nspr-devel-0:1.0.9-0.48.el3.ia64", "3AS:seamonkey-nspr-devel-0:1.0.9-0.48.el3.ppc", "3AS:seamonkey-nspr-devel-0:1.0.9-0.48.el3.s390", "3AS:seamonkey-nspr-devel-0:1.0.9-0.48.el3.s390x", "3AS:seamonkey-nspr-devel-0:1.0.9-0.48.el3.x86_64", "3AS:seamonkey-nss-0:1.0.9-0.48.el3.i386", "3AS:seamonkey-nss-0:1.0.9-0.48.el3.ia64", "3AS:seamonkey-nss-0:1.0.9-0.48.el3.ppc", "3AS:seamonkey-nss-0:1.0.9-0.48.el3.s390", "3AS:seamonkey-nss-0:1.0.9-0.48.el3.s390x", "3AS:seamonkey-nss-0:1.0.9-0.48.el3.x86_64", "3AS:seamonkey-nss-devel-0:1.0.9-0.48.el3.i386", "3AS:seamonkey-nss-devel-0:1.0.9-0.48.el3.ia64", "3AS:seamonkey-nss-devel-0:1.0.9-0.48.el3.ppc", "3AS:seamonkey-nss-devel-0:1.0.9-0.48.el3.s390", "3AS:seamonkey-nss-devel-0:1.0.9-0.48.el3.s390x", "3AS:seamonkey-nss-devel-0:1.0.9-0.48.el3.x86_64", "3Desktop:seamonkey-0:1.0.9-0.48.el3.i386", "3Desktop:seamonkey-0:1.0.9-0.48.el3.ia64", "3Desktop:seamonkey-0:1.0.9-0.48.el3.ppc", "3Desktop:seamonkey-0:1.0.9-0.48.el3.s390", "3Desktop:seamonkey-0:1.0.9-0.48.el3.s390x", "3Desktop:seamonkey-0:1.0.9-0.48.el3.src", "3Desktop:seamonkey-0:1.0.9-0.48.el3.x86_64", "3Desktop:seamonkey-chat-0:1.0.9-0.48.el3.i386", "3Desktop:seamonkey-chat-0:1.0.9-0.48.el3.ia64", "3Desktop:seamonkey-chat-0:1.0.9-0.48.el3.ppc", "3Desktop:seamonkey-chat-0:1.0.9-0.48.el3.s390", "3Desktop:seamonkey-chat-0:1.0.9-0.48.el3.s390x", "3Desktop:seamonkey-chat-0:1.0.9-0.48.el3.x86_64", "3Desktop:seamonkey-debuginfo-0:1.0.9-0.48.el3.i386", "3Desktop:seamonkey-debuginfo-0:1.0.9-0.48.el3.ia64", "3Desktop:seamonkey-debuginfo-0:1.0.9-0.48.el3.ppc", "3Desktop:seamonkey-debuginfo-0:1.0.9-0.48.el3.s390", "3Desktop:seamonkey-debuginfo-0:1.0.9-0.48.el3.s390x", "3Desktop:seamonkey-debuginfo-0:1.0.9-0.48.el3.x86_64", "3Desktop:seamonkey-devel-0:1.0.9-0.48.el3.i386", "3Desktop:seamonkey-devel-0:1.0.9-0.48.el3.ia64", "3Desktop:seamonkey-devel-0:1.0.9-0.48.el3.ppc", "3Desktop:seamonkey-devel-0:1.0.9-0.48.el3.s390", "3Desktop:seamonkey-devel-0:1.0.9-0.48.el3.s390x", "3Desktop:seamonkey-devel-0:1.0.9-0.48.el3.x86_64", "3Desktop:seamonkey-dom-inspector-0:1.0.9-0.48.el3.i386", "3Desktop:seamonkey-dom-inspector-0:1.0.9-0.48.el3.ia64", "3Desktop:seamonkey-dom-inspector-0:1.0.9-0.48.el3.ppc", "3Desktop:seamonkey-dom-inspector-0:1.0.9-0.48.el3.s390", "3Desktop:seamonkey-dom-inspector-0:1.0.9-0.48.el3.s390x", "3Desktop:seamonkey-dom-inspector-0:1.0.9-0.48.el3.x86_64", "3Desktop:seamonkey-js-debugger-0:1.0.9-0.48.el3.i386", "3Desktop:seamonkey-js-debugger-0:1.0.9-0.48.el3.ia64", "3Desktop:seamonkey-js-debugger-0:1.0.9-0.48.el3.ppc", "3Desktop:seamonkey-js-debugger-0:1.0.9-0.48.el3.s390", "3Desktop:seamonkey-js-debugger-0:1.0.9-0.48.el3.s390x", "3Desktop:seamonkey-js-debugger-0:1.0.9-0.48.el3.x86_64", "3Desktop:seamonkey-mail-0:1.0.9-0.48.el3.i386", "3Desktop:seamonkey-mail-0:1.0.9-0.48.el3.ia64", "3Desktop:seamonkey-mail-0:1.0.9-0.48.el3.ppc", "3Desktop:seamonkey-mail-0:1.0.9-0.48.el3.s390", "3Desktop:seamonkey-mail-0:1.0.9-0.48.el3.s390x", "3Desktop:seamonkey-mail-0:1.0.9-0.48.el3.x86_64", "3Desktop:seamonkey-nspr-0:1.0.9-0.48.el3.i386", "3Desktop:seamonkey-nspr-0:1.0.9-0.48.el3.ia64", "3Desktop:seamonkey-nspr-0:1.0.9-0.48.el3.ppc", "3Desktop:seamonkey-nspr-0:1.0.9-0.48.el3.s390", "3Desktop:seamonkey-nspr-0:1.0.9-0.48.el3.s390x", "3Desktop:seamonkey-nspr-0:1.0.9-0.48.el3.x86_64", "3Desktop:seamonkey-nspr-devel-0:1.0.9-0.48.el3.i386", "3Desktop:seamonkey-nspr-devel-0:1.0.9-0.48.el3.ia64", "3Desktop:seamonkey-nspr-devel-0:1.0.9-0.48.el3.ppc", "3Desktop:seamonkey-nspr-devel-0:1.0.9-0.48.el3.s390", "3Desktop:seamonkey-nspr-devel-0:1.0.9-0.48.el3.s390x", "3Desktop:seamonkey-nspr-devel-0:1.0.9-0.48.el3.x86_64", "3Desktop:seamonkey-nss-0:1.0.9-0.48.el3.i386", "3Desktop:seamonkey-nss-0:1.0.9-0.48.el3.ia64", "3Desktop:seamonkey-nss-0:1.0.9-0.48.el3.ppc", "3Desktop:seamonkey-nss-0:1.0.9-0.48.el3.s390", "3Desktop:seamonkey-nss-0:1.0.9-0.48.el3.s390x", "3Desktop:seamonkey-nss-0:1.0.9-0.48.el3.x86_64", "3Desktop:seamonkey-nss-devel-0:1.0.9-0.48.el3.i386", "3Desktop:seamonkey-nss-devel-0:1.0.9-0.48.el3.ia64", "3Desktop:seamonkey-nss-devel-0:1.0.9-0.48.el3.ppc", "3Desktop:seamonkey-nss-devel-0:1.0.9-0.48.el3.s390", "3Desktop:seamonkey-nss-devel-0:1.0.9-0.48.el3.s390x", "3Desktop:seamonkey-nss-devel-0:1.0.9-0.48.el3.x86_64", "3ES:seamonkey-0:1.0.9-0.48.el3.i386", "3ES:seamonkey-0:1.0.9-0.48.el3.ia64", "3ES:seamonkey-0:1.0.9-0.48.el3.ppc", "3ES:seamonkey-0:1.0.9-0.48.el3.s390", "3ES:seamonkey-0:1.0.9-0.48.el3.s390x", "3ES:seamonkey-0:1.0.9-0.48.el3.src", "3ES:seamonkey-0:1.0.9-0.48.el3.x86_64", "3ES:seamonkey-chat-0:1.0.9-0.48.el3.i386", "3ES:seamonkey-chat-0:1.0.9-0.48.el3.ia64", "3ES:seamonkey-chat-0:1.0.9-0.48.el3.ppc", "3ES:seamonkey-chat-0:1.0.9-0.48.el3.s390", "3ES:seamonkey-chat-0:1.0.9-0.48.el3.s390x", "3ES:seamonkey-chat-0:1.0.9-0.48.el3.x86_64", "3ES:seamonkey-debuginfo-0:1.0.9-0.48.el3.i386", "3ES:seamonkey-debuginfo-0:1.0.9-0.48.el3.ia64", "3ES:seamonkey-debuginfo-0:1.0.9-0.48.el3.ppc", "3ES:seamonkey-debuginfo-0:1.0.9-0.48.el3.s390", "3ES:seamonkey-debuginfo-0:1.0.9-0.48.el3.s390x", "3ES:seamonkey-debuginfo-0:1.0.9-0.48.el3.x86_64", "3ES:seamonkey-devel-0:1.0.9-0.48.el3.i386", "3ES:seamonkey-devel-0:1.0.9-0.48.el3.ia64", "3ES:seamonkey-devel-0:1.0.9-0.48.el3.ppc", "3ES:seamonkey-devel-0:1.0.9-0.48.el3.s390", "3ES:seamonkey-devel-0:1.0.9-0.48.el3.s390x", "3ES:seamonkey-devel-0:1.0.9-0.48.el3.x86_64", "3ES:seamonkey-dom-inspector-0:1.0.9-0.48.el3.i386", "3ES:seamonkey-dom-inspector-0:1.0.9-0.48.el3.ia64", "3ES:seamonkey-dom-inspector-0:1.0.9-0.48.el3.ppc", "3ES:seamonkey-dom-inspector-0:1.0.9-0.48.el3.s390", "3ES:seamonkey-dom-inspector-0:1.0.9-0.48.el3.s390x", "3ES:seamonkey-dom-inspector-0:1.0.9-0.48.el3.x86_64", "3ES:seamonkey-js-debugger-0:1.0.9-0.48.el3.i386", "3ES:seamonkey-js-debugger-0:1.0.9-0.48.el3.ia64", "3ES:seamonkey-js-debugger-0:1.0.9-0.48.el3.ppc", "3ES:seamonkey-js-debugger-0:1.0.9-0.48.el3.s390", "3ES:seamonkey-js-debugger-0:1.0.9-0.48.el3.s390x", "3ES:seamonkey-js-debugger-0:1.0.9-0.48.el3.x86_64", "3ES:seamonkey-mail-0:1.0.9-0.48.el3.i386", "3ES:seamonkey-mail-0:1.0.9-0.48.el3.ia64", "3ES:seamonkey-mail-0:1.0.9-0.48.el3.ppc", "3ES:seamonkey-mail-0:1.0.9-0.48.el3.s390", "3ES:seamonkey-mail-0:1.0.9-0.48.el3.s390x", "3ES:seamonkey-mail-0:1.0.9-0.48.el3.x86_64", "3ES:seamonkey-nspr-0:1.0.9-0.48.el3.i386", "3ES:seamonkey-nspr-0:1.0.9-0.48.el3.ia64", "3ES:seamonkey-nspr-0:1.0.9-0.48.el3.ppc", "3ES:seamonkey-nspr-0:1.0.9-0.48.el3.s390", "3ES:seamonkey-nspr-0:1.0.9-0.48.el3.s390x", "3ES:seamonkey-nspr-0:1.0.9-0.48.el3.x86_64", "3ES:seamonkey-nspr-devel-0:1.0.9-0.48.el3.i386", "3ES:seamonkey-nspr-devel-0:1.0.9-0.48.el3.ia64", "3ES:seamonkey-nspr-devel-0:1.0.9-0.48.el3.ppc", "3ES:seamonkey-nspr-devel-0:1.0.9-0.48.el3.s390", "3ES:seamonkey-nspr-devel-0:1.0.9-0.48.el3.s390x", "3ES:seamonkey-nspr-devel-0:1.0.9-0.48.el3.x86_64", "3ES:seamonkey-nss-0:1.0.9-0.48.el3.i386", "3ES:seamonkey-nss-0:1.0.9-0.48.el3.ia64", "3ES:seamonkey-nss-0:1.0.9-0.48.el3.ppc", "3ES:seamonkey-nss-0:1.0.9-0.48.el3.s390", "3ES:seamonkey-nss-0:1.0.9-0.48.el3.s390x", "3ES:seamonkey-nss-0:1.0.9-0.48.el3.x86_64", "3ES:seamonkey-nss-devel-0:1.0.9-0.48.el3.i386", "3ES:seamonkey-nss-devel-0:1.0.9-0.48.el3.ia64", "3ES:seamonkey-nss-devel-0:1.0.9-0.48.el3.ppc", "3ES:seamonkey-nss-devel-0:1.0.9-0.48.el3.s390", "3ES:seamonkey-nss-devel-0:1.0.9-0.48.el3.s390x", "3ES:seamonkey-nss-devel-0:1.0.9-0.48.el3.x86_64", "3WS:seamonkey-0:1.0.9-0.48.el3.i386", "3WS:seamonkey-0:1.0.9-0.48.el3.ia64", "3WS:seamonkey-0:1.0.9-0.48.el3.ppc", "3WS:seamonkey-0:1.0.9-0.48.el3.s390", "3WS:seamonkey-0:1.0.9-0.48.el3.s390x", "3WS:seamonkey-0:1.0.9-0.48.el3.src", "3WS:seamonkey-0:1.0.9-0.48.el3.x86_64", "3WS:seamonkey-chat-0:1.0.9-0.48.el3.i386", "3WS:seamonkey-chat-0:1.0.9-0.48.el3.ia64", "3WS:seamonkey-chat-0:1.0.9-0.48.el3.ppc", "3WS:seamonkey-chat-0:1.0.9-0.48.el3.s390", "3WS:seamonkey-chat-0:1.0.9-0.48.el3.s390x", "3WS:seamonkey-chat-0:1.0.9-0.48.el3.x86_64", "3WS:seamonkey-debuginfo-0:1.0.9-0.48.el3.i386", "3WS:seamonkey-debuginfo-0:1.0.9-0.48.el3.ia64", "3WS:seamonkey-debuginfo-0:1.0.9-0.48.el3.ppc", "3WS:seamonkey-debuginfo-0:1.0.9-0.48.el3.s390", "3WS:seamonkey-debuginfo-0:1.0.9-0.48.el3.s390x", "3WS:seamonkey-debuginfo-0:1.0.9-0.48.el3.x86_64", "3WS:seamonkey-devel-0:1.0.9-0.48.el3.i386", "3WS:seamonkey-devel-0:1.0.9-0.48.el3.ia64", "3WS:seamonkey-devel-0:1.0.9-0.48.el3.ppc", "3WS:seamonkey-devel-0:1.0.9-0.48.el3.s390", "3WS:seamonkey-devel-0:1.0.9-0.48.el3.s390x", "3WS:seamonkey-devel-0:1.0.9-0.48.el3.x86_64", "3WS:seamonkey-dom-inspector-0:1.0.9-0.48.el3.i386", "3WS:seamonkey-dom-inspector-0:1.0.9-0.48.el3.ia64", "3WS:seamonkey-dom-inspector-0:1.0.9-0.48.el3.ppc", "3WS:seamonkey-dom-inspector-0:1.0.9-0.48.el3.s390", "3WS:seamonkey-dom-inspector-0:1.0.9-0.48.el3.s390x", "3WS:seamonkey-dom-inspector-0:1.0.9-0.48.el3.x86_64", "3WS:seamonkey-js-debugger-0:1.0.9-0.48.el3.i386", "3WS:seamonkey-js-debugger-0:1.0.9-0.48.el3.ia64", "3WS:seamonkey-js-debugger-0:1.0.9-0.48.el3.ppc", "3WS:seamonkey-js-debugger-0:1.0.9-0.48.el3.s390", "3WS:seamonkey-js-debugger-0:1.0.9-0.48.el3.s390x", "3WS:seamonkey-js-debugger-0:1.0.9-0.48.el3.x86_64", "3WS:seamonkey-mail-0:1.0.9-0.48.el3.i386", "3WS:seamonkey-mail-0:1.0.9-0.48.el3.ia64", "3WS:seamonkey-mail-0:1.0.9-0.48.el3.ppc", "3WS:seamonkey-mail-0:1.0.9-0.48.el3.s390", "3WS:seamonkey-mail-0:1.0.9-0.48.el3.s390x", "3WS:seamonkey-mail-0:1.0.9-0.48.el3.x86_64", "3WS:seamonkey-nspr-0:1.0.9-0.48.el3.i386", "3WS:seamonkey-nspr-0:1.0.9-0.48.el3.ia64", "3WS:seamonkey-nspr-0:1.0.9-0.48.el3.ppc", "3WS:seamonkey-nspr-0:1.0.9-0.48.el3.s390", "3WS:seamonkey-nspr-0:1.0.9-0.48.el3.s390x", "3WS:seamonkey-nspr-0:1.0.9-0.48.el3.x86_64", "3WS:seamonkey-nspr-devel-0:1.0.9-0.48.el3.i386", "3WS:seamonkey-nspr-devel-0:1.0.9-0.48.el3.ia64", "3WS:seamonkey-nspr-devel-0:1.0.9-0.48.el3.ppc", "3WS:seamonkey-nspr-devel-0:1.0.9-0.48.el3.s390", "3WS:seamonkey-nspr-devel-0:1.0.9-0.48.el3.s390x", "3WS:seamonkey-nspr-devel-0:1.0.9-0.48.el3.x86_64", "3WS:seamonkey-nss-0:1.0.9-0.48.el3.i386", "3WS:seamonkey-nss-0:1.0.9-0.48.el3.ia64", "3WS:seamonkey-nss-0:1.0.9-0.48.el3.ppc", "3WS:seamonkey-nss-0:1.0.9-0.48.el3.s390", "3WS:seamonkey-nss-0:1.0.9-0.48.el3.s390x", "3WS:seamonkey-nss-0:1.0.9-0.48.el3.x86_64", "3WS:seamonkey-nss-devel-0:1.0.9-0.48.el3.i386", "3WS:seamonkey-nss-devel-0:1.0.9-0.48.el3.ia64", "3WS:seamonkey-nss-devel-0:1.0.9-0.48.el3.ppc", "3WS:seamonkey-nss-devel-0:1.0.9-0.48.el3.s390", "3WS:seamonkey-nss-devel-0:1.0.9-0.48.el3.s390x", "3WS:seamonkey-nss-devel-0:1.0.9-0.48.el3.x86_64", "4AS:seamonkey-0:1.0.9-51.el4_8.i386", "4AS:seamonkey-0:1.0.9-51.el4_8.ia64", "4AS:seamonkey-0:1.0.9-51.el4_8.ppc", "4AS:seamonkey-0:1.0.9-51.el4_8.s390", "4AS:seamonkey-0:1.0.9-51.el4_8.s390x", "4AS:seamonkey-0:1.0.9-51.el4_8.src", "4AS:seamonkey-0:1.0.9-51.el4_8.x86_64", "4AS:seamonkey-chat-0:1.0.9-51.el4_8.i386", "4AS:seamonkey-chat-0:1.0.9-51.el4_8.ia64", "4AS:seamonkey-chat-0:1.0.9-51.el4_8.ppc", "4AS:seamonkey-chat-0:1.0.9-51.el4_8.s390", "4AS:seamonkey-chat-0:1.0.9-51.el4_8.s390x", "4AS:seamonkey-chat-0:1.0.9-51.el4_8.x86_64", "4AS:seamonkey-debuginfo-0:1.0.9-51.el4_8.i386", "4AS:seamonkey-debuginfo-0:1.0.9-51.el4_8.ia64", "4AS:seamonkey-debuginfo-0:1.0.9-51.el4_8.ppc", "4AS:seamonkey-debuginfo-0:1.0.9-51.el4_8.s390", "4AS:seamonkey-debuginfo-0:1.0.9-51.el4_8.s390x", "4AS:seamonkey-debuginfo-0:1.0.9-51.el4_8.x86_64", "4AS:seamonkey-devel-0:1.0.9-51.el4_8.i386", "4AS:seamonkey-devel-0:1.0.9-51.el4_8.ia64", "4AS:seamonkey-devel-0:1.0.9-51.el4_8.ppc", "4AS:seamonkey-devel-0:1.0.9-51.el4_8.s390", "4AS:seamonkey-devel-0:1.0.9-51.el4_8.s390x", "4AS:seamonkey-devel-0:1.0.9-51.el4_8.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.9-51.el4_8.i386", "4AS:seamonkey-dom-inspector-0:1.0.9-51.el4_8.ia64", "4AS:seamonkey-dom-inspector-0:1.0.9-51.el4_8.ppc", "4AS:seamonkey-dom-inspector-0:1.0.9-51.el4_8.s390", "4AS:seamonkey-dom-inspector-0:1.0.9-51.el4_8.s390x", "4AS:seamonkey-dom-inspector-0:1.0.9-51.el4_8.x86_64", "4AS:seamonkey-js-debugger-0:1.0.9-51.el4_8.i386", "4AS:seamonkey-js-debugger-0:1.0.9-51.el4_8.ia64", "4AS:seamonkey-js-debugger-0:1.0.9-51.el4_8.ppc", "4AS:seamonkey-js-debugger-0:1.0.9-51.el4_8.s390", "4AS:seamonkey-js-debugger-0:1.0.9-51.el4_8.s390x", "4AS:seamonkey-js-debugger-0:1.0.9-51.el4_8.x86_64", "4AS:seamonkey-mail-0:1.0.9-51.el4_8.i386", "4AS:seamonkey-mail-0:1.0.9-51.el4_8.ia64", "4AS:seamonkey-mail-0:1.0.9-51.el4_8.ppc", "4AS:seamonkey-mail-0:1.0.9-51.el4_8.s390", "4AS:seamonkey-mail-0:1.0.9-51.el4_8.s390x", "4AS:seamonkey-mail-0:1.0.9-51.el4_8.x86_64", "4Desktop:seamonkey-0:1.0.9-51.el4_8.i386", "4Desktop:seamonkey-0:1.0.9-51.el4_8.ia64", "4Desktop:seamonkey-0:1.0.9-51.el4_8.ppc", "4Desktop:seamonkey-0:1.0.9-51.el4_8.s390", "4Desktop:seamonkey-0:1.0.9-51.el4_8.s390x", "4Desktop:seamonkey-0:1.0.9-51.el4_8.src", "4Desktop:seamonkey-0:1.0.9-51.el4_8.x86_64", "4Desktop:seamonkey-chat-0:1.0.9-51.el4_8.i386", "4Desktop:seamonkey-chat-0:1.0.9-51.el4_8.ia64", "4Desktop:seamonkey-chat-0:1.0.9-51.el4_8.ppc", "4Desktop:seamonkey-chat-0:1.0.9-51.el4_8.s390", "4Desktop:seamonkey-chat-0:1.0.9-51.el4_8.s390x", "4Desktop:seamonkey-chat-0:1.0.9-51.el4_8.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.9-51.el4_8.i386", "4Desktop:seamonkey-debuginfo-0:1.0.9-51.el4_8.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.9-51.el4_8.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.9-51.el4_8.s390", "4Desktop:seamonkey-debuginfo-0:1.0.9-51.el4_8.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.9-51.el4_8.x86_64", "4Desktop:seamonkey-devel-0:1.0.9-51.el4_8.i386", "4Desktop:seamonkey-devel-0:1.0.9-51.el4_8.ia64", "4Desktop:seamonkey-devel-0:1.0.9-51.el4_8.ppc", "4Desktop:seamonkey-devel-0:1.0.9-51.el4_8.s390", "4Desktop:seamonkey-devel-0:1.0.9-51.el4_8.s390x", "4Desktop:seamonkey-devel-0:1.0.9-51.el4_8.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.9-51.el4_8.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.9-51.el4_8.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.9-51.el4_8.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.9-51.el4_8.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.9-51.el4_8.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.9-51.el4_8.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.9-51.el4_8.i386", "4Desktop:seamonkey-js-debugger-0:1.0.9-51.el4_8.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.9-51.el4_8.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.9-51.el4_8.s390", "4Desktop:seamonkey-js-debugger-0:1.0.9-51.el4_8.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.9-51.el4_8.x86_64", "4Desktop:seamonkey-mail-0:1.0.9-51.el4_8.i386", "4Desktop:seamonkey-mail-0:1.0.9-51.el4_8.ia64", "4Desktop:seamonkey-mail-0:1.0.9-51.el4_8.ppc", "4Desktop:seamonkey-mail-0:1.0.9-51.el4_8.s390", "4Desktop:seamonkey-mail-0:1.0.9-51.el4_8.s390x", "4Desktop:seamonkey-mail-0:1.0.9-51.el4_8.x86_64", "4ES:seamonkey-0:1.0.9-51.el4_8.i386", "4ES:seamonkey-0:1.0.9-51.el4_8.ia64", "4ES:seamonkey-0:1.0.9-51.el4_8.ppc", "4ES:seamonkey-0:1.0.9-51.el4_8.s390", "4ES:seamonkey-0:1.0.9-51.el4_8.s390x", "4ES:seamonkey-0:1.0.9-51.el4_8.src", "4ES:seamonkey-0:1.0.9-51.el4_8.x86_64", "4ES:seamonkey-chat-0:1.0.9-51.el4_8.i386", "4ES:seamonkey-chat-0:1.0.9-51.el4_8.ia64", "4ES:seamonkey-chat-0:1.0.9-51.el4_8.ppc", "4ES:seamonkey-chat-0:1.0.9-51.el4_8.s390", "4ES:seamonkey-chat-0:1.0.9-51.el4_8.s390x", "4ES:seamonkey-chat-0:1.0.9-51.el4_8.x86_64", "4ES:seamonkey-debuginfo-0:1.0.9-51.el4_8.i386", "4ES:seamonkey-debuginfo-0:1.0.9-51.el4_8.ia64", "4ES:seamonkey-debuginfo-0:1.0.9-51.el4_8.ppc", "4ES:seamonkey-debuginfo-0:1.0.9-51.el4_8.s390", "4ES:seamonkey-debuginfo-0:1.0.9-51.el4_8.s390x", "4ES:seamonkey-debuginfo-0:1.0.9-51.el4_8.x86_64", "4ES:seamonkey-devel-0:1.0.9-51.el4_8.i386", "4ES:seamonkey-devel-0:1.0.9-51.el4_8.ia64", "4ES:seamonkey-devel-0:1.0.9-51.el4_8.ppc", "4ES:seamonkey-devel-0:1.0.9-51.el4_8.s390", "4ES:seamonkey-devel-0:1.0.9-51.el4_8.s390x", "4ES:seamonkey-devel-0:1.0.9-51.el4_8.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.9-51.el4_8.i386", "4ES:seamonkey-dom-inspector-0:1.0.9-51.el4_8.ia64", "4ES:seamonkey-dom-inspector-0:1.0.9-51.el4_8.ppc", "4ES:seamonkey-dom-inspector-0:1.0.9-51.el4_8.s390", "4ES:seamonkey-dom-inspector-0:1.0.9-51.el4_8.s390x", "4ES:seamonkey-dom-inspector-0:1.0.9-51.el4_8.x86_64", "4ES:seamonkey-js-debugger-0:1.0.9-51.el4_8.i386", "4ES:seamonkey-js-debugger-0:1.0.9-51.el4_8.ia64", "4ES:seamonkey-js-debugger-0:1.0.9-51.el4_8.ppc", "4ES:seamonkey-js-debugger-0:1.0.9-51.el4_8.s390", "4ES:seamonkey-js-debugger-0:1.0.9-51.el4_8.s390x", "4ES:seamonkey-js-debugger-0:1.0.9-51.el4_8.x86_64", "4ES:seamonkey-mail-0:1.0.9-51.el4_8.i386", "4ES:seamonkey-mail-0:1.0.9-51.el4_8.ia64", "4ES:seamonkey-mail-0:1.0.9-51.el4_8.ppc", "4ES:seamonkey-mail-0:1.0.9-51.el4_8.s390", "4ES:seamonkey-mail-0:1.0.9-51.el4_8.s390x", "4ES:seamonkey-mail-0:1.0.9-51.el4_8.x86_64", "4WS:seamonkey-0:1.0.9-51.el4_8.i386", "4WS:seamonkey-0:1.0.9-51.el4_8.ia64", "4WS:seamonkey-0:1.0.9-51.el4_8.ppc", "4WS:seamonkey-0:1.0.9-51.el4_8.s390", "4WS:seamonkey-0:1.0.9-51.el4_8.s390x", "4WS:seamonkey-0:1.0.9-51.el4_8.src", "4WS:seamonkey-0:1.0.9-51.el4_8.x86_64", "4WS:seamonkey-chat-0:1.0.9-51.el4_8.i386", "4WS:seamonkey-chat-0:1.0.9-51.el4_8.ia64", "4WS:seamonkey-chat-0:1.0.9-51.el4_8.ppc", "4WS:seamonkey-chat-0:1.0.9-51.el4_8.s390", "4WS:seamonkey-chat-0:1.0.9-51.el4_8.s390x", "4WS:seamonkey-chat-0:1.0.9-51.el4_8.x86_64", "4WS:seamonkey-debuginfo-0:1.0.9-51.el4_8.i386", "4WS:seamonkey-debuginfo-0:1.0.9-51.el4_8.ia64", "4WS:seamonkey-debuginfo-0:1.0.9-51.el4_8.ppc", "4WS:seamonkey-debuginfo-0:1.0.9-51.el4_8.s390", "4WS:seamonkey-debuginfo-0:1.0.9-51.el4_8.s390x", "4WS:seamonkey-debuginfo-0:1.0.9-51.el4_8.x86_64", "4WS:seamonkey-devel-0:1.0.9-51.el4_8.i386", "4WS:seamonkey-devel-0:1.0.9-51.el4_8.ia64", "4WS:seamonkey-devel-0:1.0.9-51.el4_8.ppc", "4WS:seamonkey-devel-0:1.0.9-51.el4_8.s390", "4WS:seamonkey-devel-0:1.0.9-51.el4_8.s390x", "4WS:seamonkey-devel-0:1.0.9-51.el4_8.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.9-51.el4_8.i386", "4WS:seamonkey-dom-inspector-0:1.0.9-51.el4_8.ia64", "4WS:seamonkey-dom-inspector-0:1.0.9-51.el4_8.ppc", "4WS:seamonkey-dom-inspector-0:1.0.9-51.el4_8.s390", "4WS:seamonkey-dom-inspector-0:1.0.9-51.el4_8.s390x", "4WS:seamonkey-dom-inspector-0:1.0.9-51.el4_8.x86_64", "4WS:seamonkey-js-debugger-0:1.0.9-51.el4_8.i386", "4WS:seamonkey-js-debugger-0:1.0.9-51.el4_8.ia64", "4WS:seamonkey-js-debugger-0:1.0.9-51.el4_8.ppc", "4WS:seamonkey-js-debugger-0:1.0.9-51.el4_8.s390", "4WS:seamonkey-js-debugger-0:1.0.9-51.el4_8.s390x", "4WS:seamonkey-js-debugger-0:1.0.9-51.el4_8.x86_64", "4WS:seamonkey-mail-0:1.0.9-51.el4_8.i386", "4WS:seamonkey-mail-0:1.0.9-51.el4_8.ia64", "4WS:seamonkey-mail-0:1.0.9-51.el4_8.ppc", "4WS:seamonkey-mail-0:1.0.9-51.el4_8.s390", "4WS:seamonkey-mail-0:1.0.9-51.el4_8.s390x", "4WS:seamonkey-mail-0:1.0.9-51.el4_8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1673" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "3AS:seamonkey-0:1.0.9-0.48.el3.i386", "3AS:seamonkey-0:1.0.9-0.48.el3.ia64", "3AS:seamonkey-0:1.0.9-0.48.el3.ppc", "3AS:seamonkey-0:1.0.9-0.48.el3.s390", "3AS:seamonkey-0:1.0.9-0.48.el3.s390x", "3AS:seamonkey-0:1.0.9-0.48.el3.src", "3AS:seamonkey-0:1.0.9-0.48.el3.x86_64", "3AS:seamonkey-chat-0:1.0.9-0.48.el3.i386", "3AS:seamonkey-chat-0:1.0.9-0.48.el3.ia64", "3AS:seamonkey-chat-0:1.0.9-0.48.el3.ppc", "3AS:seamonkey-chat-0:1.0.9-0.48.el3.s390", "3AS:seamonkey-chat-0:1.0.9-0.48.el3.s390x", "3AS:seamonkey-chat-0:1.0.9-0.48.el3.x86_64", "3AS:seamonkey-debuginfo-0:1.0.9-0.48.el3.i386", "3AS:seamonkey-debuginfo-0:1.0.9-0.48.el3.ia64", "3AS:seamonkey-debuginfo-0:1.0.9-0.48.el3.ppc", "3AS:seamonkey-debuginfo-0:1.0.9-0.48.el3.s390", "3AS:seamonkey-debuginfo-0:1.0.9-0.48.el3.s390x", "3AS:seamonkey-debuginfo-0:1.0.9-0.48.el3.x86_64", "3AS:seamonkey-devel-0:1.0.9-0.48.el3.i386", "3AS:seamonkey-devel-0:1.0.9-0.48.el3.ia64", "3AS:seamonkey-devel-0:1.0.9-0.48.el3.ppc", "3AS:seamonkey-devel-0:1.0.9-0.48.el3.s390", "3AS:seamonkey-devel-0:1.0.9-0.48.el3.s390x", "3AS:seamonkey-devel-0:1.0.9-0.48.el3.x86_64", "3AS:seamonkey-dom-inspector-0:1.0.9-0.48.el3.i386", "3AS:seamonkey-dom-inspector-0:1.0.9-0.48.el3.ia64", "3AS:seamonkey-dom-inspector-0:1.0.9-0.48.el3.ppc", "3AS:seamonkey-dom-inspector-0:1.0.9-0.48.el3.s390", "3AS:seamonkey-dom-inspector-0:1.0.9-0.48.el3.s390x", "3AS:seamonkey-dom-inspector-0:1.0.9-0.48.el3.x86_64", "3AS:seamonkey-js-debugger-0:1.0.9-0.48.el3.i386", "3AS:seamonkey-js-debugger-0:1.0.9-0.48.el3.ia64", "3AS:seamonkey-js-debugger-0:1.0.9-0.48.el3.ppc", "3AS:seamonkey-js-debugger-0:1.0.9-0.48.el3.s390", "3AS:seamonkey-js-debugger-0:1.0.9-0.48.el3.s390x", "3AS:seamonkey-js-debugger-0:1.0.9-0.48.el3.x86_64", "3AS:seamonkey-mail-0:1.0.9-0.48.el3.i386", "3AS:seamonkey-mail-0:1.0.9-0.48.el3.ia64", "3AS:seamonkey-mail-0:1.0.9-0.48.el3.ppc", "3AS:seamonkey-mail-0:1.0.9-0.48.el3.s390", "3AS:seamonkey-mail-0:1.0.9-0.48.el3.s390x", "3AS:seamonkey-mail-0:1.0.9-0.48.el3.x86_64", "3AS:seamonkey-nspr-0:1.0.9-0.48.el3.i386", "3AS:seamonkey-nspr-0:1.0.9-0.48.el3.ia64", "3AS:seamonkey-nspr-0:1.0.9-0.48.el3.ppc", "3AS:seamonkey-nspr-0:1.0.9-0.48.el3.s390", "3AS:seamonkey-nspr-0:1.0.9-0.48.el3.s390x", "3AS:seamonkey-nspr-0:1.0.9-0.48.el3.x86_64", "3AS:seamonkey-nspr-devel-0:1.0.9-0.48.el3.i386", "3AS:seamonkey-nspr-devel-0:1.0.9-0.48.el3.ia64", "3AS:seamonkey-nspr-devel-0:1.0.9-0.48.el3.ppc", "3AS:seamonkey-nspr-devel-0:1.0.9-0.48.el3.s390", "3AS:seamonkey-nspr-devel-0:1.0.9-0.48.el3.s390x", "3AS:seamonkey-nspr-devel-0:1.0.9-0.48.el3.x86_64", "3AS:seamonkey-nss-0:1.0.9-0.48.el3.i386", "3AS:seamonkey-nss-0:1.0.9-0.48.el3.ia64", "3AS:seamonkey-nss-0:1.0.9-0.48.el3.ppc", "3AS:seamonkey-nss-0:1.0.9-0.48.el3.s390", "3AS:seamonkey-nss-0:1.0.9-0.48.el3.s390x", "3AS:seamonkey-nss-0:1.0.9-0.48.el3.x86_64", "3AS:seamonkey-nss-devel-0:1.0.9-0.48.el3.i386", "3AS:seamonkey-nss-devel-0:1.0.9-0.48.el3.ia64", "3AS:seamonkey-nss-devel-0:1.0.9-0.48.el3.ppc", "3AS:seamonkey-nss-devel-0:1.0.9-0.48.el3.s390", "3AS:seamonkey-nss-devel-0:1.0.9-0.48.el3.s390x", "3AS:seamonkey-nss-devel-0:1.0.9-0.48.el3.x86_64", "3Desktop:seamonkey-0:1.0.9-0.48.el3.i386", "3Desktop:seamonkey-0:1.0.9-0.48.el3.ia64", "3Desktop:seamonkey-0:1.0.9-0.48.el3.ppc", "3Desktop:seamonkey-0:1.0.9-0.48.el3.s390", "3Desktop:seamonkey-0:1.0.9-0.48.el3.s390x", "3Desktop:seamonkey-0:1.0.9-0.48.el3.src", "3Desktop:seamonkey-0:1.0.9-0.48.el3.x86_64", "3Desktop:seamonkey-chat-0:1.0.9-0.48.el3.i386", "3Desktop:seamonkey-chat-0:1.0.9-0.48.el3.ia64", "3Desktop:seamonkey-chat-0:1.0.9-0.48.el3.ppc", "3Desktop:seamonkey-chat-0:1.0.9-0.48.el3.s390", "3Desktop:seamonkey-chat-0:1.0.9-0.48.el3.s390x", "3Desktop:seamonkey-chat-0:1.0.9-0.48.el3.x86_64", "3Desktop:seamonkey-debuginfo-0:1.0.9-0.48.el3.i386", "3Desktop:seamonkey-debuginfo-0:1.0.9-0.48.el3.ia64", "3Desktop:seamonkey-debuginfo-0:1.0.9-0.48.el3.ppc", "3Desktop:seamonkey-debuginfo-0:1.0.9-0.48.el3.s390", "3Desktop:seamonkey-debuginfo-0:1.0.9-0.48.el3.s390x", "3Desktop:seamonkey-debuginfo-0:1.0.9-0.48.el3.x86_64", "3Desktop:seamonkey-devel-0:1.0.9-0.48.el3.i386", "3Desktop:seamonkey-devel-0:1.0.9-0.48.el3.ia64", "3Desktop:seamonkey-devel-0:1.0.9-0.48.el3.ppc", "3Desktop:seamonkey-devel-0:1.0.9-0.48.el3.s390", "3Desktop:seamonkey-devel-0:1.0.9-0.48.el3.s390x", "3Desktop:seamonkey-devel-0:1.0.9-0.48.el3.x86_64", "3Desktop:seamonkey-dom-inspector-0:1.0.9-0.48.el3.i386", "3Desktop:seamonkey-dom-inspector-0:1.0.9-0.48.el3.ia64", "3Desktop:seamonkey-dom-inspector-0:1.0.9-0.48.el3.ppc", "3Desktop:seamonkey-dom-inspector-0:1.0.9-0.48.el3.s390", "3Desktop:seamonkey-dom-inspector-0:1.0.9-0.48.el3.s390x", "3Desktop:seamonkey-dom-inspector-0:1.0.9-0.48.el3.x86_64", "3Desktop:seamonkey-js-debugger-0:1.0.9-0.48.el3.i386", "3Desktop:seamonkey-js-debugger-0:1.0.9-0.48.el3.ia64", "3Desktop:seamonkey-js-debugger-0:1.0.9-0.48.el3.ppc", "3Desktop:seamonkey-js-debugger-0:1.0.9-0.48.el3.s390", "3Desktop:seamonkey-js-debugger-0:1.0.9-0.48.el3.s390x", "3Desktop:seamonkey-js-debugger-0:1.0.9-0.48.el3.x86_64", "3Desktop:seamonkey-mail-0:1.0.9-0.48.el3.i386", "3Desktop:seamonkey-mail-0:1.0.9-0.48.el3.ia64", "3Desktop:seamonkey-mail-0:1.0.9-0.48.el3.ppc", "3Desktop:seamonkey-mail-0:1.0.9-0.48.el3.s390", "3Desktop:seamonkey-mail-0:1.0.9-0.48.el3.s390x", "3Desktop:seamonkey-mail-0:1.0.9-0.48.el3.x86_64", "3Desktop:seamonkey-nspr-0:1.0.9-0.48.el3.i386", "3Desktop:seamonkey-nspr-0:1.0.9-0.48.el3.ia64", "3Desktop:seamonkey-nspr-0:1.0.9-0.48.el3.ppc", "3Desktop:seamonkey-nspr-0:1.0.9-0.48.el3.s390", "3Desktop:seamonkey-nspr-0:1.0.9-0.48.el3.s390x", "3Desktop:seamonkey-nspr-0:1.0.9-0.48.el3.x86_64", "3Desktop:seamonkey-nspr-devel-0:1.0.9-0.48.el3.i386", "3Desktop:seamonkey-nspr-devel-0:1.0.9-0.48.el3.ia64", "3Desktop:seamonkey-nspr-devel-0:1.0.9-0.48.el3.ppc", "3Desktop:seamonkey-nspr-devel-0:1.0.9-0.48.el3.s390", "3Desktop:seamonkey-nspr-devel-0:1.0.9-0.48.el3.s390x", "3Desktop:seamonkey-nspr-devel-0:1.0.9-0.48.el3.x86_64", "3Desktop:seamonkey-nss-0:1.0.9-0.48.el3.i386", "3Desktop:seamonkey-nss-0:1.0.9-0.48.el3.ia64", "3Desktop:seamonkey-nss-0:1.0.9-0.48.el3.ppc", "3Desktop:seamonkey-nss-0:1.0.9-0.48.el3.s390", "3Desktop:seamonkey-nss-0:1.0.9-0.48.el3.s390x", "3Desktop:seamonkey-nss-0:1.0.9-0.48.el3.x86_64", "3Desktop:seamonkey-nss-devel-0:1.0.9-0.48.el3.i386", "3Desktop:seamonkey-nss-devel-0:1.0.9-0.48.el3.ia64", "3Desktop:seamonkey-nss-devel-0:1.0.9-0.48.el3.ppc", "3Desktop:seamonkey-nss-devel-0:1.0.9-0.48.el3.s390", "3Desktop:seamonkey-nss-devel-0:1.0.9-0.48.el3.s390x", "3Desktop:seamonkey-nss-devel-0:1.0.9-0.48.el3.x86_64", "3ES:seamonkey-0:1.0.9-0.48.el3.i386", "3ES:seamonkey-0:1.0.9-0.48.el3.ia64", "3ES:seamonkey-0:1.0.9-0.48.el3.ppc", "3ES:seamonkey-0:1.0.9-0.48.el3.s390", "3ES:seamonkey-0:1.0.9-0.48.el3.s390x", "3ES:seamonkey-0:1.0.9-0.48.el3.src", "3ES:seamonkey-0:1.0.9-0.48.el3.x86_64", "3ES:seamonkey-chat-0:1.0.9-0.48.el3.i386", "3ES:seamonkey-chat-0:1.0.9-0.48.el3.ia64", "3ES:seamonkey-chat-0:1.0.9-0.48.el3.ppc", "3ES:seamonkey-chat-0:1.0.9-0.48.el3.s390", "3ES:seamonkey-chat-0:1.0.9-0.48.el3.s390x", "3ES:seamonkey-chat-0:1.0.9-0.48.el3.x86_64", "3ES:seamonkey-debuginfo-0:1.0.9-0.48.el3.i386", "3ES:seamonkey-debuginfo-0:1.0.9-0.48.el3.ia64", "3ES:seamonkey-debuginfo-0:1.0.9-0.48.el3.ppc", "3ES:seamonkey-debuginfo-0:1.0.9-0.48.el3.s390", "3ES:seamonkey-debuginfo-0:1.0.9-0.48.el3.s390x", "3ES:seamonkey-debuginfo-0:1.0.9-0.48.el3.x86_64", "3ES:seamonkey-devel-0:1.0.9-0.48.el3.i386", "3ES:seamonkey-devel-0:1.0.9-0.48.el3.ia64", "3ES:seamonkey-devel-0:1.0.9-0.48.el3.ppc", "3ES:seamonkey-devel-0:1.0.9-0.48.el3.s390", "3ES:seamonkey-devel-0:1.0.9-0.48.el3.s390x", "3ES:seamonkey-devel-0:1.0.9-0.48.el3.x86_64", "3ES:seamonkey-dom-inspector-0:1.0.9-0.48.el3.i386", "3ES:seamonkey-dom-inspector-0:1.0.9-0.48.el3.ia64", "3ES:seamonkey-dom-inspector-0:1.0.9-0.48.el3.ppc", "3ES:seamonkey-dom-inspector-0:1.0.9-0.48.el3.s390", "3ES:seamonkey-dom-inspector-0:1.0.9-0.48.el3.s390x", "3ES:seamonkey-dom-inspector-0:1.0.9-0.48.el3.x86_64", "3ES:seamonkey-js-debugger-0:1.0.9-0.48.el3.i386", "3ES:seamonkey-js-debugger-0:1.0.9-0.48.el3.ia64", "3ES:seamonkey-js-debugger-0:1.0.9-0.48.el3.ppc", "3ES:seamonkey-js-debugger-0:1.0.9-0.48.el3.s390", "3ES:seamonkey-js-debugger-0:1.0.9-0.48.el3.s390x", "3ES:seamonkey-js-debugger-0:1.0.9-0.48.el3.x86_64", "3ES:seamonkey-mail-0:1.0.9-0.48.el3.i386", "3ES:seamonkey-mail-0:1.0.9-0.48.el3.ia64", "3ES:seamonkey-mail-0:1.0.9-0.48.el3.ppc", "3ES:seamonkey-mail-0:1.0.9-0.48.el3.s390", "3ES:seamonkey-mail-0:1.0.9-0.48.el3.s390x", "3ES:seamonkey-mail-0:1.0.9-0.48.el3.x86_64", "3ES:seamonkey-nspr-0:1.0.9-0.48.el3.i386", "3ES:seamonkey-nspr-0:1.0.9-0.48.el3.ia64", "3ES:seamonkey-nspr-0:1.0.9-0.48.el3.ppc", "3ES:seamonkey-nspr-0:1.0.9-0.48.el3.s390", "3ES:seamonkey-nspr-0:1.0.9-0.48.el3.s390x", "3ES:seamonkey-nspr-0:1.0.9-0.48.el3.x86_64", "3ES:seamonkey-nspr-devel-0:1.0.9-0.48.el3.i386", "3ES:seamonkey-nspr-devel-0:1.0.9-0.48.el3.ia64", "3ES:seamonkey-nspr-devel-0:1.0.9-0.48.el3.ppc", "3ES:seamonkey-nspr-devel-0:1.0.9-0.48.el3.s390", "3ES:seamonkey-nspr-devel-0:1.0.9-0.48.el3.s390x", "3ES:seamonkey-nspr-devel-0:1.0.9-0.48.el3.x86_64", "3ES:seamonkey-nss-0:1.0.9-0.48.el3.i386", "3ES:seamonkey-nss-0:1.0.9-0.48.el3.ia64", "3ES:seamonkey-nss-0:1.0.9-0.48.el3.ppc", "3ES:seamonkey-nss-0:1.0.9-0.48.el3.s390", "3ES:seamonkey-nss-0:1.0.9-0.48.el3.s390x", "3ES:seamonkey-nss-0:1.0.9-0.48.el3.x86_64", "3ES:seamonkey-nss-devel-0:1.0.9-0.48.el3.i386", "3ES:seamonkey-nss-devel-0:1.0.9-0.48.el3.ia64", "3ES:seamonkey-nss-devel-0:1.0.9-0.48.el3.ppc", "3ES:seamonkey-nss-devel-0:1.0.9-0.48.el3.s390", "3ES:seamonkey-nss-devel-0:1.0.9-0.48.el3.s390x", "3ES:seamonkey-nss-devel-0:1.0.9-0.48.el3.x86_64", "3WS:seamonkey-0:1.0.9-0.48.el3.i386", "3WS:seamonkey-0:1.0.9-0.48.el3.ia64", "3WS:seamonkey-0:1.0.9-0.48.el3.ppc", "3WS:seamonkey-0:1.0.9-0.48.el3.s390", "3WS:seamonkey-0:1.0.9-0.48.el3.s390x", "3WS:seamonkey-0:1.0.9-0.48.el3.src", "3WS:seamonkey-0:1.0.9-0.48.el3.x86_64", "3WS:seamonkey-chat-0:1.0.9-0.48.el3.i386", "3WS:seamonkey-chat-0:1.0.9-0.48.el3.ia64", "3WS:seamonkey-chat-0:1.0.9-0.48.el3.ppc", "3WS:seamonkey-chat-0:1.0.9-0.48.el3.s390", "3WS:seamonkey-chat-0:1.0.9-0.48.el3.s390x", "3WS:seamonkey-chat-0:1.0.9-0.48.el3.x86_64", "3WS:seamonkey-debuginfo-0:1.0.9-0.48.el3.i386", "3WS:seamonkey-debuginfo-0:1.0.9-0.48.el3.ia64", "3WS:seamonkey-debuginfo-0:1.0.9-0.48.el3.ppc", "3WS:seamonkey-debuginfo-0:1.0.9-0.48.el3.s390", "3WS:seamonkey-debuginfo-0:1.0.9-0.48.el3.s390x", "3WS:seamonkey-debuginfo-0:1.0.9-0.48.el3.x86_64", "3WS:seamonkey-devel-0:1.0.9-0.48.el3.i386", "3WS:seamonkey-devel-0:1.0.9-0.48.el3.ia64", "3WS:seamonkey-devel-0:1.0.9-0.48.el3.ppc", "3WS:seamonkey-devel-0:1.0.9-0.48.el3.s390", "3WS:seamonkey-devel-0:1.0.9-0.48.el3.s390x", "3WS:seamonkey-devel-0:1.0.9-0.48.el3.x86_64", "3WS:seamonkey-dom-inspector-0:1.0.9-0.48.el3.i386", "3WS:seamonkey-dom-inspector-0:1.0.9-0.48.el3.ia64", "3WS:seamonkey-dom-inspector-0:1.0.9-0.48.el3.ppc", "3WS:seamonkey-dom-inspector-0:1.0.9-0.48.el3.s390", "3WS:seamonkey-dom-inspector-0:1.0.9-0.48.el3.s390x", "3WS:seamonkey-dom-inspector-0:1.0.9-0.48.el3.x86_64", "3WS:seamonkey-js-debugger-0:1.0.9-0.48.el3.i386", "3WS:seamonkey-js-debugger-0:1.0.9-0.48.el3.ia64", "3WS:seamonkey-js-debugger-0:1.0.9-0.48.el3.ppc", "3WS:seamonkey-js-debugger-0:1.0.9-0.48.el3.s390", "3WS:seamonkey-js-debugger-0:1.0.9-0.48.el3.s390x", "3WS:seamonkey-js-debugger-0:1.0.9-0.48.el3.x86_64", "3WS:seamonkey-mail-0:1.0.9-0.48.el3.i386", "3WS:seamonkey-mail-0:1.0.9-0.48.el3.ia64", "3WS:seamonkey-mail-0:1.0.9-0.48.el3.ppc", "3WS:seamonkey-mail-0:1.0.9-0.48.el3.s390", "3WS:seamonkey-mail-0:1.0.9-0.48.el3.s390x", "3WS:seamonkey-mail-0:1.0.9-0.48.el3.x86_64", "3WS:seamonkey-nspr-0:1.0.9-0.48.el3.i386", "3WS:seamonkey-nspr-0:1.0.9-0.48.el3.ia64", "3WS:seamonkey-nspr-0:1.0.9-0.48.el3.ppc", "3WS:seamonkey-nspr-0:1.0.9-0.48.el3.s390", "3WS:seamonkey-nspr-0:1.0.9-0.48.el3.s390x", "3WS:seamonkey-nspr-0:1.0.9-0.48.el3.x86_64", "3WS:seamonkey-nspr-devel-0:1.0.9-0.48.el3.i386", "3WS:seamonkey-nspr-devel-0:1.0.9-0.48.el3.ia64", "3WS:seamonkey-nspr-devel-0:1.0.9-0.48.el3.ppc", "3WS:seamonkey-nspr-devel-0:1.0.9-0.48.el3.s390", "3WS:seamonkey-nspr-devel-0:1.0.9-0.48.el3.s390x", "3WS:seamonkey-nspr-devel-0:1.0.9-0.48.el3.x86_64", "3WS:seamonkey-nss-0:1.0.9-0.48.el3.i386", "3WS:seamonkey-nss-0:1.0.9-0.48.el3.ia64", "3WS:seamonkey-nss-0:1.0.9-0.48.el3.ppc", "3WS:seamonkey-nss-0:1.0.9-0.48.el3.s390", "3WS:seamonkey-nss-0:1.0.9-0.48.el3.s390x", "3WS:seamonkey-nss-0:1.0.9-0.48.el3.x86_64", "3WS:seamonkey-nss-devel-0:1.0.9-0.48.el3.i386", "3WS:seamonkey-nss-devel-0:1.0.9-0.48.el3.ia64", "3WS:seamonkey-nss-devel-0:1.0.9-0.48.el3.ppc", "3WS:seamonkey-nss-devel-0:1.0.9-0.48.el3.s390", "3WS:seamonkey-nss-devel-0:1.0.9-0.48.el3.s390x", "3WS:seamonkey-nss-devel-0:1.0.9-0.48.el3.x86_64", "4AS:seamonkey-0:1.0.9-51.el4_8.i386", "4AS:seamonkey-0:1.0.9-51.el4_8.ia64", "4AS:seamonkey-0:1.0.9-51.el4_8.ppc", "4AS:seamonkey-0:1.0.9-51.el4_8.s390", "4AS:seamonkey-0:1.0.9-51.el4_8.s390x", "4AS:seamonkey-0:1.0.9-51.el4_8.src", "4AS:seamonkey-0:1.0.9-51.el4_8.x86_64", "4AS:seamonkey-chat-0:1.0.9-51.el4_8.i386", "4AS:seamonkey-chat-0:1.0.9-51.el4_8.ia64", "4AS:seamonkey-chat-0:1.0.9-51.el4_8.ppc", "4AS:seamonkey-chat-0:1.0.9-51.el4_8.s390", "4AS:seamonkey-chat-0:1.0.9-51.el4_8.s390x", "4AS:seamonkey-chat-0:1.0.9-51.el4_8.x86_64", "4AS:seamonkey-debuginfo-0:1.0.9-51.el4_8.i386", "4AS:seamonkey-debuginfo-0:1.0.9-51.el4_8.ia64", "4AS:seamonkey-debuginfo-0:1.0.9-51.el4_8.ppc", "4AS:seamonkey-debuginfo-0:1.0.9-51.el4_8.s390", "4AS:seamonkey-debuginfo-0:1.0.9-51.el4_8.s390x", "4AS:seamonkey-debuginfo-0:1.0.9-51.el4_8.x86_64", "4AS:seamonkey-devel-0:1.0.9-51.el4_8.i386", "4AS:seamonkey-devel-0:1.0.9-51.el4_8.ia64", "4AS:seamonkey-devel-0:1.0.9-51.el4_8.ppc", "4AS:seamonkey-devel-0:1.0.9-51.el4_8.s390", "4AS:seamonkey-devel-0:1.0.9-51.el4_8.s390x", "4AS:seamonkey-devel-0:1.0.9-51.el4_8.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.9-51.el4_8.i386", "4AS:seamonkey-dom-inspector-0:1.0.9-51.el4_8.ia64", "4AS:seamonkey-dom-inspector-0:1.0.9-51.el4_8.ppc", "4AS:seamonkey-dom-inspector-0:1.0.9-51.el4_8.s390", "4AS:seamonkey-dom-inspector-0:1.0.9-51.el4_8.s390x", "4AS:seamonkey-dom-inspector-0:1.0.9-51.el4_8.x86_64", "4AS:seamonkey-js-debugger-0:1.0.9-51.el4_8.i386", "4AS:seamonkey-js-debugger-0:1.0.9-51.el4_8.ia64", "4AS:seamonkey-js-debugger-0:1.0.9-51.el4_8.ppc", "4AS:seamonkey-js-debugger-0:1.0.9-51.el4_8.s390", "4AS:seamonkey-js-debugger-0:1.0.9-51.el4_8.s390x", "4AS:seamonkey-js-debugger-0:1.0.9-51.el4_8.x86_64", "4AS:seamonkey-mail-0:1.0.9-51.el4_8.i386", "4AS:seamonkey-mail-0:1.0.9-51.el4_8.ia64", "4AS:seamonkey-mail-0:1.0.9-51.el4_8.ppc", "4AS:seamonkey-mail-0:1.0.9-51.el4_8.s390", "4AS:seamonkey-mail-0:1.0.9-51.el4_8.s390x", "4AS:seamonkey-mail-0:1.0.9-51.el4_8.x86_64", "4Desktop:seamonkey-0:1.0.9-51.el4_8.i386", "4Desktop:seamonkey-0:1.0.9-51.el4_8.ia64", "4Desktop:seamonkey-0:1.0.9-51.el4_8.ppc", "4Desktop:seamonkey-0:1.0.9-51.el4_8.s390", "4Desktop:seamonkey-0:1.0.9-51.el4_8.s390x", "4Desktop:seamonkey-0:1.0.9-51.el4_8.src", "4Desktop:seamonkey-0:1.0.9-51.el4_8.x86_64", "4Desktop:seamonkey-chat-0:1.0.9-51.el4_8.i386", "4Desktop:seamonkey-chat-0:1.0.9-51.el4_8.ia64", "4Desktop:seamonkey-chat-0:1.0.9-51.el4_8.ppc", "4Desktop:seamonkey-chat-0:1.0.9-51.el4_8.s390", "4Desktop:seamonkey-chat-0:1.0.9-51.el4_8.s390x", "4Desktop:seamonkey-chat-0:1.0.9-51.el4_8.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.9-51.el4_8.i386", "4Desktop:seamonkey-debuginfo-0:1.0.9-51.el4_8.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.9-51.el4_8.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.9-51.el4_8.s390", "4Desktop:seamonkey-debuginfo-0:1.0.9-51.el4_8.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.9-51.el4_8.x86_64", "4Desktop:seamonkey-devel-0:1.0.9-51.el4_8.i386", "4Desktop:seamonkey-devel-0:1.0.9-51.el4_8.ia64", "4Desktop:seamonkey-devel-0:1.0.9-51.el4_8.ppc", "4Desktop:seamonkey-devel-0:1.0.9-51.el4_8.s390", "4Desktop:seamonkey-devel-0:1.0.9-51.el4_8.s390x", "4Desktop:seamonkey-devel-0:1.0.9-51.el4_8.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.9-51.el4_8.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.9-51.el4_8.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.9-51.el4_8.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.9-51.el4_8.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.9-51.el4_8.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.9-51.el4_8.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.9-51.el4_8.i386", "4Desktop:seamonkey-js-debugger-0:1.0.9-51.el4_8.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.9-51.el4_8.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.9-51.el4_8.s390", "4Desktop:seamonkey-js-debugger-0:1.0.9-51.el4_8.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.9-51.el4_8.x86_64", "4Desktop:seamonkey-mail-0:1.0.9-51.el4_8.i386", "4Desktop:seamonkey-mail-0:1.0.9-51.el4_8.ia64", "4Desktop:seamonkey-mail-0:1.0.9-51.el4_8.ppc", "4Desktop:seamonkey-mail-0:1.0.9-51.el4_8.s390", "4Desktop:seamonkey-mail-0:1.0.9-51.el4_8.s390x", "4Desktop:seamonkey-mail-0:1.0.9-51.el4_8.x86_64", "4ES:seamonkey-0:1.0.9-51.el4_8.i386", "4ES:seamonkey-0:1.0.9-51.el4_8.ia64", "4ES:seamonkey-0:1.0.9-51.el4_8.ppc", "4ES:seamonkey-0:1.0.9-51.el4_8.s390", "4ES:seamonkey-0:1.0.9-51.el4_8.s390x", "4ES:seamonkey-0:1.0.9-51.el4_8.src", "4ES:seamonkey-0:1.0.9-51.el4_8.x86_64", "4ES:seamonkey-chat-0:1.0.9-51.el4_8.i386", "4ES:seamonkey-chat-0:1.0.9-51.el4_8.ia64", "4ES:seamonkey-chat-0:1.0.9-51.el4_8.ppc", "4ES:seamonkey-chat-0:1.0.9-51.el4_8.s390", "4ES:seamonkey-chat-0:1.0.9-51.el4_8.s390x", "4ES:seamonkey-chat-0:1.0.9-51.el4_8.x86_64", "4ES:seamonkey-debuginfo-0:1.0.9-51.el4_8.i386", "4ES:seamonkey-debuginfo-0:1.0.9-51.el4_8.ia64", "4ES:seamonkey-debuginfo-0:1.0.9-51.el4_8.ppc", "4ES:seamonkey-debuginfo-0:1.0.9-51.el4_8.s390", "4ES:seamonkey-debuginfo-0:1.0.9-51.el4_8.s390x", "4ES:seamonkey-debuginfo-0:1.0.9-51.el4_8.x86_64", "4ES:seamonkey-devel-0:1.0.9-51.el4_8.i386", "4ES:seamonkey-devel-0:1.0.9-51.el4_8.ia64", "4ES:seamonkey-devel-0:1.0.9-51.el4_8.ppc", "4ES:seamonkey-devel-0:1.0.9-51.el4_8.s390", "4ES:seamonkey-devel-0:1.0.9-51.el4_8.s390x", "4ES:seamonkey-devel-0:1.0.9-51.el4_8.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.9-51.el4_8.i386", "4ES:seamonkey-dom-inspector-0:1.0.9-51.el4_8.ia64", "4ES:seamonkey-dom-inspector-0:1.0.9-51.el4_8.ppc", "4ES:seamonkey-dom-inspector-0:1.0.9-51.el4_8.s390", "4ES:seamonkey-dom-inspector-0:1.0.9-51.el4_8.s390x", "4ES:seamonkey-dom-inspector-0:1.0.9-51.el4_8.x86_64", "4ES:seamonkey-js-debugger-0:1.0.9-51.el4_8.i386", "4ES:seamonkey-js-debugger-0:1.0.9-51.el4_8.ia64", "4ES:seamonkey-js-debugger-0:1.0.9-51.el4_8.ppc", "4ES:seamonkey-js-debugger-0:1.0.9-51.el4_8.s390", "4ES:seamonkey-js-debugger-0:1.0.9-51.el4_8.s390x", "4ES:seamonkey-js-debugger-0:1.0.9-51.el4_8.x86_64", "4ES:seamonkey-mail-0:1.0.9-51.el4_8.i386", "4ES:seamonkey-mail-0:1.0.9-51.el4_8.ia64", "4ES:seamonkey-mail-0:1.0.9-51.el4_8.ppc", "4ES:seamonkey-mail-0:1.0.9-51.el4_8.s390", "4ES:seamonkey-mail-0:1.0.9-51.el4_8.s390x", "4ES:seamonkey-mail-0:1.0.9-51.el4_8.x86_64", "4WS:seamonkey-0:1.0.9-51.el4_8.i386", "4WS:seamonkey-0:1.0.9-51.el4_8.ia64", "4WS:seamonkey-0:1.0.9-51.el4_8.ppc", "4WS:seamonkey-0:1.0.9-51.el4_8.s390", "4WS:seamonkey-0:1.0.9-51.el4_8.s390x", "4WS:seamonkey-0:1.0.9-51.el4_8.src", "4WS:seamonkey-0:1.0.9-51.el4_8.x86_64", "4WS:seamonkey-chat-0:1.0.9-51.el4_8.i386", "4WS:seamonkey-chat-0:1.0.9-51.el4_8.ia64", "4WS:seamonkey-chat-0:1.0.9-51.el4_8.ppc", "4WS:seamonkey-chat-0:1.0.9-51.el4_8.s390", "4WS:seamonkey-chat-0:1.0.9-51.el4_8.s390x", "4WS:seamonkey-chat-0:1.0.9-51.el4_8.x86_64", "4WS:seamonkey-debuginfo-0:1.0.9-51.el4_8.i386", "4WS:seamonkey-debuginfo-0:1.0.9-51.el4_8.ia64", "4WS:seamonkey-debuginfo-0:1.0.9-51.el4_8.ppc", "4WS:seamonkey-debuginfo-0:1.0.9-51.el4_8.s390", "4WS:seamonkey-debuginfo-0:1.0.9-51.el4_8.s390x", "4WS:seamonkey-debuginfo-0:1.0.9-51.el4_8.x86_64", "4WS:seamonkey-devel-0:1.0.9-51.el4_8.i386", "4WS:seamonkey-devel-0:1.0.9-51.el4_8.ia64", "4WS:seamonkey-devel-0:1.0.9-51.el4_8.ppc", "4WS:seamonkey-devel-0:1.0.9-51.el4_8.s390", "4WS:seamonkey-devel-0:1.0.9-51.el4_8.s390x", "4WS:seamonkey-devel-0:1.0.9-51.el4_8.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.9-51.el4_8.i386", "4WS:seamonkey-dom-inspector-0:1.0.9-51.el4_8.ia64", "4WS:seamonkey-dom-inspector-0:1.0.9-51.el4_8.ppc", "4WS:seamonkey-dom-inspector-0:1.0.9-51.el4_8.s390", "4WS:seamonkey-dom-inspector-0:1.0.9-51.el4_8.s390x", "4WS:seamonkey-dom-inspector-0:1.0.9-51.el4_8.x86_64", "4WS:seamonkey-js-debugger-0:1.0.9-51.el4_8.i386", "4WS:seamonkey-js-debugger-0:1.0.9-51.el4_8.ia64", "4WS:seamonkey-js-debugger-0:1.0.9-51.el4_8.ppc", "4WS:seamonkey-js-debugger-0:1.0.9-51.el4_8.s390", "4WS:seamonkey-js-debugger-0:1.0.9-51.el4_8.s390x", "4WS:seamonkey-js-debugger-0:1.0.9-51.el4_8.x86_64", "4WS:seamonkey-mail-0:1.0.9-51.el4_8.i386", "4WS:seamonkey-mail-0:1.0.9-51.el4_8.ia64", "4WS:seamonkey-mail-0:1.0.9-51.el4_8.ppc", "4WS:seamonkey-mail-0:1.0.9-51.el4_8.s390", "4WS:seamonkey-mail-0:1.0.9-51.el4_8.s390x", "4WS:seamonkey-mail-0:1.0.9-51.el4_8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Mozilla SSL spoofing with document.location and empty SSL response page" } ] }
rhsa-2009_1674
Vulnerability from csaf_redhat
Published
2009-12-16 04:56
Modified
2024-11-25 11:52
Summary
Red Hat Security Advisory: firefox security update
Notes
Topic
Updated firefox packages that fix several security issues are now available
for Red Hat Enterprise Linux 4 and 5.
This update has been rated as having critical security impact by the Red
Hat Security Response Team.
Details
Mozilla Firefox is an open source Web browser. XULRunner provides the XUL
Runtime environment for Mozilla Firefox.
Several flaws were found in the processing of malformed web content. A web
page containing malicious content could cause Firefox to crash or,
potentially, execute arbitrary code with the privileges of the user running
Firefox. (CVE-2009-3979, CVE-2009-3981, CVE-2009-3986)
A flaw was found in the Firefox NT Lan Manager (NTLM) authentication
protocol implementation. If an attacker could trick a local user that has
NTLM credentials into visiting a specially-crafted web page, they could
send arbitrary requests, authenticated with the user's NTLM credentials, to
other applications on the user's system. (CVE-2009-3983)
A flaw was found in the way Firefox displayed the SSL location bar
indicator. An attacker could create an unencrypted web page that appears to
be encrypted, possibly tricking the user into believing they are visiting a
secure page. (CVE-2009-3984)
A flaw was found in the way Firefox displayed blank pages after a user
navigates to an invalid address. If a user visits an attacker-controlled
web page that results in a blank page, the attacker could inject content
into that blank page, possibly tricking the user into believing they are
viewing a legitimate page. (CVE-2009-3985)
For technical details regarding these flaws, refer to the Mozilla security
advisories for Firefox 3.0.16. You can find a link to the Mozilla
advisories in the References section of this errata.
All Firefox users should upgrade to these updated packages, which contain
Firefox version 3.0.16, which corrects these issues. After installing the
update, Firefox must be restarted for the changes to take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated firefox packages that fix several security issues are now available\nfor Red Hat Enterprise Linux 4 and 5.\n\nThis update has been rated as having critical security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "Mozilla Firefox is an open source Web browser. XULRunner provides the XUL\nRuntime environment for Mozilla Firefox.\n\nSeveral flaws were found in the processing of malformed web content. A web\npage containing malicious content could cause Firefox to crash or,\npotentially, execute arbitrary code with the privileges of the user running\nFirefox. (CVE-2009-3979, CVE-2009-3981, CVE-2009-3986)\n\nA flaw was found in the Firefox NT Lan Manager (NTLM) authentication\nprotocol implementation. If an attacker could trick a local user that has\nNTLM credentials into visiting a specially-crafted web page, they could\nsend arbitrary requests, authenticated with the user\u0027s NTLM credentials, to\nother applications on the user\u0027s system. (CVE-2009-3983)\n\nA flaw was found in the way Firefox displayed the SSL location bar\nindicator. An attacker could create an unencrypted web page that appears to\nbe encrypted, possibly tricking the user into believing they are visiting a\nsecure page. (CVE-2009-3984)\n\nA flaw was found in the way Firefox displayed blank pages after a user\nnavigates to an invalid address. If a user visits an attacker-controlled\nweb page that results in a blank page, the attacker could inject content\ninto that blank page, possibly tricking the user into believing they are\nviewing a legitimate page. (CVE-2009-3985)\n\nFor technical details regarding these flaws, refer to the Mozilla security\nadvisories for Firefox 3.0.16. You can find a link to the Mozilla\nadvisories in the References section of this errata.\n\nAll Firefox users should upgrade to these updated packages, which contain\nFirefox version 3.0.16, which corrects these issues. After installing the\nupdate, Firefox must be restarted for the changes to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2009:1674", "url": "https://access.redhat.com/errata/RHSA-2009:1674" }, { "category": "external", "summary": "http://www.redhat.com/security/updates/classification/#critical", "url": "http://www.redhat.com/security/updates/classification/#critical" }, { "category": "external", "summary": "http://www.mozilla.org/security/known-vulnerabilities/firefox30.html#firefox3.0.16", "url": "http://www.mozilla.org/security/known-vulnerabilities/firefox30.html#firefox3.0.16" }, { "category": "external", "summary": "546694", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=546694" }, { "category": "external", "summary": "546713", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=546713" }, { "category": "external", "summary": "546720", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=546720" }, { "category": "external", "summary": "546722", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=546722" }, { "category": "external", "summary": "546724", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=546724" }, { "category": "external", "summary": "546726", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=546726" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_1674.json" } ], "title": "Red Hat Security Advisory: firefox security update", "tracking": { "current_release_date": "2024-11-25T11:52:10+00:00", "generator": { "date": "2024-11-25T11:52:10+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2009:1674", "initial_release_date": "2009-12-16T04:56:00+00:00", "revision_history": [ { "date": "2009-12-16T04:56:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2009-12-16T00:03:54+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-25T11:52:10+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 4", "product": { "name": "Red Hat Enterprise Linux AS version 4", "product_id": "4AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::as" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop version 4", "product": { "name": "Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 4", "product": { "name": "Red Hat Enterprise Linux ES version 4", "product_id": "4ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 4", "product": { "name": "Red Hat Enterprise Linux WS version 4", "product_id": "4WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::ws" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client_workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux (v. 5 server)", "product": { "name": "Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "firefox-0:3.0.16-4.el4.ia64", "product": { "name": "firefox-0:3.0.16-4.el4.ia64", "product_id": "firefox-0:3.0.16-4.el4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox@3.0.16-4.el4?arch=ia64" } } }, { "category": "product_version", "name": "firefox-debuginfo-0:3.0.16-4.el4.ia64", "product": { "name": "firefox-debuginfo-0:3.0.16-4.el4.ia64", "product_id": "firefox-debuginfo-0:3.0.16-4.el4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox-debuginfo@3.0.16-4.el4?arch=ia64" } } }, { "category": "product_version", "name": "xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ia64", "product": { "name": "xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ia64", "product_id": "xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xulrunner-debuginfo@1.9.0.16-2.el5_4?arch=ia64" } } }, { "category": "product_version", "name": "xulrunner-devel-0:1.9.0.16-2.el5_4.ia64", "product": { "name": "xulrunner-devel-0:1.9.0.16-2.el5_4.ia64", "product_id": "xulrunner-devel-0:1.9.0.16-2.el5_4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xulrunner-devel@1.9.0.16-2.el5_4?arch=ia64" } } }, { "category": "product_version", "name": "xulrunner-0:1.9.0.16-2.el5_4.ia64", "product": { "name": "xulrunner-0:1.9.0.16-2.el5_4.ia64", "product_id": "xulrunner-0:1.9.0.16-2.el5_4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xulrunner@1.9.0.16-2.el5_4?arch=ia64" } } }, { "category": "product_version", "name": "xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.ia64", "product": { "name": "xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.ia64", "product_id": "xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xulrunner-devel-unstable@1.9.0.16-2.el5_4?arch=ia64" } } }, { "category": "product_version", "name": "firefox-0:3.0.16-1.el5_4.ia64", "product": { "name": "firefox-0:3.0.16-1.el5_4.ia64", "product_id": "firefox-0:3.0.16-1.el5_4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox@3.0.16-1.el5_4?arch=ia64" } } }, { "category": "product_version", "name": "firefox-debuginfo-0:3.0.16-1.el5_4.ia64", "product": { "name": "firefox-debuginfo-0:3.0.16-1.el5_4.ia64", "product_id": "firefox-debuginfo-0:3.0.16-1.el5_4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox-debuginfo@3.0.16-1.el5_4?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "firefox-0:3.0.16-4.el4.src", "product": { "name": "firefox-0:3.0.16-4.el4.src", "product_id": "firefox-0:3.0.16-4.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox@3.0.16-4.el4?arch=src" } } }, { "category": "product_version", "name": "xulrunner-0:1.9.0.16-2.el5_4.src", "product": { "name": "xulrunner-0:1.9.0.16-2.el5_4.src", "product_id": "xulrunner-0:1.9.0.16-2.el5_4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/xulrunner@1.9.0.16-2.el5_4?arch=src" } } }, { "category": "product_version", "name": "firefox-0:3.0.16-1.el5_4.src", "product": { "name": "firefox-0:3.0.16-1.el5_4.src", "product_id": "firefox-0:3.0.16-1.el5_4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox@3.0.16-1.el5_4?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "firefox-0:3.0.16-4.el4.x86_64", "product": { "name": "firefox-0:3.0.16-4.el4.x86_64", "product_id": "firefox-0:3.0.16-4.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox@3.0.16-4.el4?arch=x86_64" } } }, { "category": "product_version", "name": "firefox-debuginfo-0:3.0.16-4.el4.x86_64", "product": { "name": "firefox-debuginfo-0:3.0.16-4.el4.x86_64", "product_id": "firefox-debuginfo-0:3.0.16-4.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox-debuginfo@3.0.16-4.el4?arch=x86_64" } } }, { "category": "product_version", "name": "xulrunner-debuginfo-0:1.9.0.16-2.el5_4.x86_64", "product": { "name": "xulrunner-debuginfo-0:1.9.0.16-2.el5_4.x86_64", "product_id": "xulrunner-debuginfo-0:1.9.0.16-2.el5_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xulrunner-debuginfo@1.9.0.16-2.el5_4?arch=x86_64" } } }, { "category": "product_version", "name": "xulrunner-devel-0:1.9.0.16-2.el5_4.x86_64", "product": { "name": "xulrunner-devel-0:1.9.0.16-2.el5_4.x86_64", "product_id": "xulrunner-devel-0:1.9.0.16-2.el5_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xulrunner-devel@1.9.0.16-2.el5_4?arch=x86_64" } } }, { "category": "product_version", "name": "xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.x86_64", "product": { "name": "xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.x86_64", "product_id": "xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xulrunner-devel-unstable@1.9.0.16-2.el5_4?arch=x86_64" } } }, { "category": "product_version", "name": "xulrunner-0:1.9.0.16-2.el5_4.x86_64", "product": { "name": "xulrunner-0:1.9.0.16-2.el5_4.x86_64", "product_id": "xulrunner-0:1.9.0.16-2.el5_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xulrunner@1.9.0.16-2.el5_4?arch=x86_64" } } }, { "category": "product_version", "name": "firefox-0:3.0.16-1.el5_4.x86_64", "product": { "name": "firefox-0:3.0.16-1.el5_4.x86_64", "product_id": "firefox-0:3.0.16-1.el5_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox@3.0.16-1.el5_4?arch=x86_64" } } }, { "category": "product_version", "name": "firefox-debuginfo-0:3.0.16-1.el5_4.x86_64", "product": { "name": "firefox-debuginfo-0:3.0.16-1.el5_4.x86_64", "product_id": "firefox-debuginfo-0:3.0.16-1.el5_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox-debuginfo@3.0.16-1.el5_4?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "firefox-0:3.0.16-4.el4.i386", "product": { "name": "firefox-0:3.0.16-4.el4.i386", "product_id": "firefox-0:3.0.16-4.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox@3.0.16-4.el4?arch=i386" } } }, { "category": "product_version", "name": "firefox-debuginfo-0:3.0.16-4.el4.i386", "product": { "name": "firefox-debuginfo-0:3.0.16-4.el4.i386", "product_id": "firefox-debuginfo-0:3.0.16-4.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox-debuginfo@3.0.16-4.el4?arch=i386" } } }, { "category": "product_version", "name": "xulrunner-debuginfo-0:1.9.0.16-2.el5_4.i386", "product": { "name": "xulrunner-debuginfo-0:1.9.0.16-2.el5_4.i386", "product_id": "xulrunner-debuginfo-0:1.9.0.16-2.el5_4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/xulrunner-debuginfo@1.9.0.16-2.el5_4?arch=i386" } } }, { "category": "product_version", "name": "xulrunner-devel-0:1.9.0.16-2.el5_4.i386", "product": { "name": "xulrunner-devel-0:1.9.0.16-2.el5_4.i386", "product_id": "xulrunner-devel-0:1.9.0.16-2.el5_4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/xulrunner-devel@1.9.0.16-2.el5_4?arch=i386" } } }, { "category": "product_version", "name": "xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.i386", "product": { "name": "xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.i386", "product_id": "xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/xulrunner-devel-unstable@1.9.0.16-2.el5_4?arch=i386" } } }, { "category": "product_version", "name": "xulrunner-0:1.9.0.16-2.el5_4.i386", "product": { "name": "xulrunner-0:1.9.0.16-2.el5_4.i386", "product_id": "xulrunner-0:1.9.0.16-2.el5_4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/xulrunner@1.9.0.16-2.el5_4?arch=i386" } } }, { "category": "product_version", "name": "firefox-0:3.0.16-1.el5_4.i386", "product": { "name": "firefox-0:3.0.16-1.el5_4.i386", "product_id": "firefox-0:3.0.16-1.el5_4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox@3.0.16-1.el5_4?arch=i386" } } }, { "category": "product_version", "name": "firefox-debuginfo-0:3.0.16-1.el5_4.i386", "product": { "name": "firefox-debuginfo-0:3.0.16-1.el5_4.i386", "product_id": "firefox-debuginfo-0:3.0.16-1.el5_4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox-debuginfo@3.0.16-1.el5_4?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "firefox-0:3.0.16-4.el4.ppc", "product": { "name": "firefox-0:3.0.16-4.el4.ppc", "product_id": "firefox-0:3.0.16-4.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox@3.0.16-4.el4?arch=ppc" } } }, { "category": "product_version", "name": "firefox-debuginfo-0:3.0.16-4.el4.ppc", "product": { "name": "firefox-debuginfo-0:3.0.16-4.el4.ppc", "product_id": "firefox-debuginfo-0:3.0.16-4.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox-debuginfo@3.0.16-4.el4?arch=ppc" } } }, { "category": "product_version", "name": "xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ppc", "product": { "name": "xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ppc", "product_id": "xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/xulrunner-debuginfo@1.9.0.16-2.el5_4?arch=ppc" } } }, { "category": "product_version", "name": "xulrunner-devel-0:1.9.0.16-2.el5_4.ppc", "product": { "name": "xulrunner-devel-0:1.9.0.16-2.el5_4.ppc", "product_id": "xulrunner-devel-0:1.9.0.16-2.el5_4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/xulrunner-devel@1.9.0.16-2.el5_4?arch=ppc" } } }, { "category": "product_version", "name": "xulrunner-0:1.9.0.16-2.el5_4.ppc", "product": { "name": "xulrunner-0:1.9.0.16-2.el5_4.ppc", "product_id": "xulrunner-0:1.9.0.16-2.el5_4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/xulrunner@1.9.0.16-2.el5_4?arch=ppc" } } }, { "category": "product_version", "name": "xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.ppc", "product": { "name": "xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.ppc", "product_id": "xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/xulrunner-devel-unstable@1.9.0.16-2.el5_4?arch=ppc" } } }, { "category": "product_version", "name": "firefox-0:3.0.16-1.el5_4.ppc", "product": { "name": "firefox-0:3.0.16-1.el5_4.ppc", "product_id": "firefox-0:3.0.16-1.el5_4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox@3.0.16-1.el5_4?arch=ppc" } } }, { "category": "product_version", "name": "firefox-debuginfo-0:3.0.16-1.el5_4.ppc", "product": { "name": "firefox-debuginfo-0:3.0.16-1.el5_4.ppc", "product_id": "firefox-debuginfo-0:3.0.16-1.el5_4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox-debuginfo@3.0.16-1.el5_4?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "firefox-0:3.0.16-4.el4.s390x", "product": { "name": "firefox-0:3.0.16-4.el4.s390x", "product_id": "firefox-0:3.0.16-4.el4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox@3.0.16-4.el4?arch=s390x" } } }, { "category": "product_version", "name": "firefox-debuginfo-0:3.0.16-4.el4.s390x", "product": { "name": "firefox-debuginfo-0:3.0.16-4.el4.s390x", "product_id": "firefox-debuginfo-0:3.0.16-4.el4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox-debuginfo@3.0.16-4.el4?arch=s390x" } } }, { "category": "product_version", "name": "xulrunner-debuginfo-0:1.9.0.16-2.el5_4.s390x", "product": { "name": "xulrunner-debuginfo-0:1.9.0.16-2.el5_4.s390x", "product_id": "xulrunner-debuginfo-0:1.9.0.16-2.el5_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/xulrunner-debuginfo@1.9.0.16-2.el5_4?arch=s390x" } } }, { "category": "product_version", "name": "xulrunner-devel-0:1.9.0.16-2.el5_4.s390x", "product": { "name": "xulrunner-devel-0:1.9.0.16-2.el5_4.s390x", "product_id": "xulrunner-devel-0:1.9.0.16-2.el5_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/xulrunner-devel@1.9.0.16-2.el5_4?arch=s390x" } } }, { "category": "product_version", "name": "xulrunner-0:1.9.0.16-2.el5_4.s390x", "product": { "name": "xulrunner-0:1.9.0.16-2.el5_4.s390x", "product_id": "xulrunner-0:1.9.0.16-2.el5_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/xulrunner@1.9.0.16-2.el5_4?arch=s390x" } } }, { "category": "product_version", "name": "xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.s390x", "product": { "name": "xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.s390x", "product_id": "xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/xulrunner-devel-unstable@1.9.0.16-2.el5_4?arch=s390x" } } }, { "category": "product_version", "name": "firefox-0:3.0.16-1.el5_4.s390x", "product": { "name": "firefox-0:3.0.16-1.el5_4.s390x", "product_id": "firefox-0:3.0.16-1.el5_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox@3.0.16-1.el5_4?arch=s390x" } } }, { "category": "product_version", "name": "firefox-debuginfo-0:3.0.16-1.el5_4.s390x", "product": { "name": "firefox-debuginfo-0:3.0.16-1.el5_4.s390x", "product_id": "firefox-debuginfo-0:3.0.16-1.el5_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox-debuginfo@3.0.16-1.el5_4?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "firefox-0:3.0.16-4.el4.s390", "product": { "name": "firefox-0:3.0.16-4.el4.s390", "product_id": "firefox-0:3.0.16-4.el4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox@3.0.16-4.el4?arch=s390" } } }, { "category": "product_version", "name": "firefox-debuginfo-0:3.0.16-4.el4.s390", "product": { "name": "firefox-debuginfo-0:3.0.16-4.el4.s390", "product_id": "firefox-debuginfo-0:3.0.16-4.el4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox-debuginfo@3.0.16-4.el4?arch=s390" } } }, { "category": "product_version", "name": "xulrunner-debuginfo-0:1.9.0.16-2.el5_4.s390", "product": { "name": "xulrunner-debuginfo-0:1.9.0.16-2.el5_4.s390", "product_id": "xulrunner-debuginfo-0:1.9.0.16-2.el5_4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/xulrunner-debuginfo@1.9.0.16-2.el5_4?arch=s390" } } }, { "category": "product_version", "name": "xulrunner-devel-0:1.9.0.16-2.el5_4.s390", "product": { "name": "xulrunner-devel-0:1.9.0.16-2.el5_4.s390", "product_id": "xulrunner-devel-0:1.9.0.16-2.el5_4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/xulrunner-devel@1.9.0.16-2.el5_4?arch=s390" } } }, { "category": "product_version", "name": "xulrunner-0:1.9.0.16-2.el5_4.s390", "product": { "name": "xulrunner-0:1.9.0.16-2.el5_4.s390", "product_id": "xulrunner-0:1.9.0.16-2.el5_4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/xulrunner@1.9.0.16-2.el5_4?arch=s390" } } }, { "category": "product_version", "name": "firefox-0:3.0.16-1.el5_4.s390", "product": { "name": "firefox-0:3.0.16-1.el5_4.s390", "product_id": "firefox-0:3.0.16-1.el5_4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox@3.0.16-1.el5_4?arch=s390" } } }, { "category": "product_version", "name": "firefox-debuginfo-0:3.0.16-1.el5_4.s390", "product": { "name": "firefox-debuginfo-0:3.0.16-1.el5_4.s390", "product_id": "firefox-debuginfo-0:3.0.16-1.el5_4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox-debuginfo@3.0.16-1.el5_4?arch=s390" } } } ], "category": "architecture", "name": "s390" }, { "branches": [ { "category": "product_version", "name": "xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ppc64", "product": { "name": "xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ppc64", "product_id": "xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xulrunner-debuginfo@1.9.0.16-2.el5_4?arch=ppc64" } } }, { "category": "product_version", "name": "xulrunner-devel-0:1.9.0.16-2.el5_4.ppc64", "product": { "name": "xulrunner-devel-0:1.9.0.16-2.el5_4.ppc64", "product_id": "xulrunner-devel-0:1.9.0.16-2.el5_4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xulrunner-devel@1.9.0.16-2.el5_4?arch=ppc64" } } }, { "category": "product_version", "name": "xulrunner-0:1.9.0.16-2.el5_4.ppc64", "product": { "name": "xulrunner-0:1.9.0.16-2.el5_4.ppc64", "product_id": "xulrunner-0:1.9.0.16-2.el5_4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xulrunner@1.9.0.16-2.el5_4?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "firefox-0:3.0.16-4.el4.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:firefox-0:3.0.16-4.el4.i386" }, "product_reference": "firefox-0:3.0.16-4.el4.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:3.0.16-4.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:firefox-0:3.0.16-4.el4.ia64" }, "product_reference": "firefox-0:3.0.16-4.el4.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:3.0.16-4.el4.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:firefox-0:3.0.16-4.el4.ppc" }, "product_reference": "firefox-0:3.0.16-4.el4.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:3.0.16-4.el4.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:firefox-0:3.0.16-4.el4.s390" }, "product_reference": "firefox-0:3.0.16-4.el4.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:3.0.16-4.el4.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:firefox-0:3.0.16-4.el4.s390x" }, "product_reference": "firefox-0:3.0.16-4.el4.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:3.0.16-4.el4.src as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:firefox-0:3.0.16-4.el4.src" }, "product_reference": "firefox-0:3.0.16-4.el4.src", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:3.0.16-4.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:firefox-0:3.0.16-4.el4.x86_64" }, "product_reference": "firefox-0:3.0.16-4.el4.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:3.0.16-4.el4.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:firefox-debuginfo-0:3.0.16-4.el4.i386" }, "product_reference": "firefox-debuginfo-0:3.0.16-4.el4.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:3.0.16-4.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:firefox-debuginfo-0:3.0.16-4.el4.ia64" }, "product_reference": "firefox-debuginfo-0:3.0.16-4.el4.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:3.0.16-4.el4.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:firefox-debuginfo-0:3.0.16-4.el4.ppc" }, "product_reference": "firefox-debuginfo-0:3.0.16-4.el4.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:3.0.16-4.el4.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:firefox-debuginfo-0:3.0.16-4.el4.s390" }, "product_reference": "firefox-debuginfo-0:3.0.16-4.el4.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:3.0.16-4.el4.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:firefox-debuginfo-0:3.0.16-4.el4.s390x" }, "product_reference": "firefox-debuginfo-0:3.0.16-4.el4.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:3.0.16-4.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:firefox-debuginfo-0:3.0.16-4.el4.x86_64" }, "product_reference": "firefox-debuginfo-0:3.0.16-4.el4.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:3.0.16-4.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:firefox-0:3.0.16-4.el4.i386" }, "product_reference": "firefox-0:3.0.16-4.el4.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:3.0.16-4.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:firefox-0:3.0.16-4.el4.ia64" }, "product_reference": "firefox-0:3.0.16-4.el4.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:3.0.16-4.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:firefox-0:3.0.16-4.el4.ppc" }, "product_reference": "firefox-0:3.0.16-4.el4.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:3.0.16-4.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:firefox-0:3.0.16-4.el4.s390" }, "product_reference": "firefox-0:3.0.16-4.el4.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:3.0.16-4.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:firefox-0:3.0.16-4.el4.s390x" }, "product_reference": "firefox-0:3.0.16-4.el4.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:3.0.16-4.el4.src as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:firefox-0:3.0.16-4.el4.src" }, "product_reference": "firefox-0:3.0.16-4.el4.src", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:3.0.16-4.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:firefox-0:3.0.16-4.el4.x86_64" }, "product_reference": "firefox-0:3.0.16-4.el4.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:3.0.16-4.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:firefox-debuginfo-0:3.0.16-4.el4.i386" }, "product_reference": "firefox-debuginfo-0:3.0.16-4.el4.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:3.0.16-4.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:firefox-debuginfo-0:3.0.16-4.el4.ia64" }, "product_reference": "firefox-debuginfo-0:3.0.16-4.el4.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:3.0.16-4.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:firefox-debuginfo-0:3.0.16-4.el4.ppc" }, "product_reference": "firefox-debuginfo-0:3.0.16-4.el4.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:3.0.16-4.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:firefox-debuginfo-0:3.0.16-4.el4.s390" }, "product_reference": "firefox-debuginfo-0:3.0.16-4.el4.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:3.0.16-4.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:firefox-debuginfo-0:3.0.16-4.el4.s390x" }, "product_reference": "firefox-debuginfo-0:3.0.16-4.el4.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:3.0.16-4.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:firefox-debuginfo-0:3.0.16-4.el4.x86_64" }, "product_reference": "firefox-debuginfo-0:3.0.16-4.el4.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:3.0.16-4.el4.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:firefox-0:3.0.16-4.el4.i386" }, "product_reference": "firefox-0:3.0.16-4.el4.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:3.0.16-4.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:firefox-0:3.0.16-4.el4.ia64" }, "product_reference": "firefox-0:3.0.16-4.el4.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:3.0.16-4.el4.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:firefox-0:3.0.16-4.el4.ppc" }, "product_reference": "firefox-0:3.0.16-4.el4.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:3.0.16-4.el4.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:firefox-0:3.0.16-4.el4.s390" }, "product_reference": "firefox-0:3.0.16-4.el4.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:3.0.16-4.el4.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:firefox-0:3.0.16-4.el4.s390x" }, "product_reference": "firefox-0:3.0.16-4.el4.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:3.0.16-4.el4.src as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:firefox-0:3.0.16-4.el4.src" }, "product_reference": "firefox-0:3.0.16-4.el4.src", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:3.0.16-4.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:firefox-0:3.0.16-4.el4.x86_64" }, "product_reference": "firefox-0:3.0.16-4.el4.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:3.0.16-4.el4.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:firefox-debuginfo-0:3.0.16-4.el4.i386" }, "product_reference": "firefox-debuginfo-0:3.0.16-4.el4.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:3.0.16-4.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:firefox-debuginfo-0:3.0.16-4.el4.ia64" }, "product_reference": "firefox-debuginfo-0:3.0.16-4.el4.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:3.0.16-4.el4.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:firefox-debuginfo-0:3.0.16-4.el4.ppc" }, "product_reference": "firefox-debuginfo-0:3.0.16-4.el4.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:3.0.16-4.el4.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:firefox-debuginfo-0:3.0.16-4.el4.s390" }, "product_reference": "firefox-debuginfo-0:3.0.16-4.el4.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:3.0.16-4.el4.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:firefox-debuginfo-0:3.0.16-4.el4.s390x" }, "product_reference": "firefox-debuginfo-0:3.0.16-4.el4.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:3.0.16-4.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:firefox-debuginfo-0:3.0.16-4.el4.x86_64" }, "product_reference": "firefox-debuginfo-0:3.0.16-4.el4.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:3.0.16-4.el4.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:firefox-0:3.0.16-4.el4.i386" }, "product_reference": "firefox-0:3.0.16-4.el4.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:3.0.16-4.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:firefox-0:3.0.16-4.el4.ia64" }, "product_reference": "firefox-0:3.0.16-4.el4.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:3.0.16-4.el4.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:firefox-0:3.0.16-4.el4.ppc" }, "product_reference": "firefox-0:3.0.16-4.el4.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:3.0.16-4.el4.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:firefox-0:3.0.16-4.el4.s390" }, "product_reference": "firefox-0:3.0.16-4.el4.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:3.0.16-4.el4.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:firefox-0:3.0.16-4.el4.s390x" }, "product_reference": "firefox-0:3.0.16-4.el4.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:3.0.16-4.el4.src as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:firefox-0:3.0.16-4.el4.src" }, "product_reference": "firefox-0:3.0.16-4.el4.src", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:3.0.16-4.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:firefox-0:3.0.16-4.el4.x86_64" }, "product_reference": "firefox-0:3.0.16-4.el4.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:3.0.16-4.el4.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:firefox-debuginfo-0:3.0.16-4.el4.i386" }, "product_reference": "firefox-debuginfo-0:3.0.16-4.el4.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:3.0.16-4.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:firefox-debuginfo-0:3.0.16-4.el4.ia64" }, "product_reference": "firefox-debuginfo-0:3.0.16-4.el4.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:3.0.16-4.el4.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:firefox-debuginfo-0:3.0.16-4.el4.ppc" }, "product_reference": "firefox-debuginfo-0:3.0.16-4.el4.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:3.0.16-4.el4.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:firefox-debuginfo-0:3.0.16-4.el4.s390" }, "product_reference": "firefox-debuginfo-0:3.0.16-4.el4.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:3.0.16-4.el4.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:firefox-debuginfo-0:3.0.16-4.el4.s390x" }, "product_reference": "firefox-debuginfo-0:3.0.16-4.el4.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:3.0.16-4.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:firefox-debuginfo-0:3.0.16-4.el4.x86_64" }, "product_reference": "firefox-debuginfo-0:3.0.16-4.el4.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-0:1.9.0.16-2.el5_4.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:xulrunner-0:1.9.0.16-2.el5_4.i386" }, "product_reference": "xulrunner-0:1.9.0.16-2.el5_4.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-0:1.9.0.16-2.el5_4.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:xulrunner-0:1.9.0.16-2.el5_4.ia64" }, "product_reference": "xulrunner-0:1.9.0.16-2.el5_4.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-0:1.9.0.16-2.el5_4.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:xulrunner-0:1.9.0.16-2.el5_4.ppc" }, "product_reference": "xulrunner-0:1.9.0.16-2.el5_4.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-0:1.9.0.16-2.el5_4.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:xulrunner-0:1.9.0.16-2.el5_4.ppc64" }, "product_reference": "xulrunner-0:1.9.0.16-2.el5_4.ppc64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-0:1.9.0.16-2.el5_4.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:xulrunner-0:1.9.0.16-2.el5_4.s390" }, "product_reference": "xulrunner-0:1.9.0.16-2.el5_4.s390", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-0:1.9.0.16-2.el5_4.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:xulrunner-0:1.9.0.16-2.el5_4.s390x" }, "product_reference": "xulrunner-0:1.9.0.16-2.el5_4.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-0:1.9.0.16-2.el5_4.src as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:xulrunner-0:1.9.0.16-2.el5_4.src" }, "product_reference": "xulrunner-0:1.9.0.16-2.el5_4.src", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-0:1.9.0.16-2.el5_4.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:xulrunner-0:1.9.0.16-2.el5_4.x86_64" }, "product_reference": "xulrunner-0:1.9.0.16-2.el5_4.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-debuginfo-0:1.9.0.16-2.el5_4.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.i386" }, "product_reference": "xulrunner-debuginfo-0:1.9.0.16-2.el5_4.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ia64" }, "product_reference": "xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ppc" }, "product_reference": "xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ppc64" }, "product_reference": "xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ppc64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-debuginfo-0:1.9.0.16-2.el5_4.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.s390" }, "product_reference": "xulrunner-debuginfo-0:1.9.0.16-2.el5_4.s390", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-debuginfo-0:1.9.0.16-2.el5_4.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.s390x" }, "product_reference": "xulrunner-debuginfo-0:1.9.0.16-2.el5_4.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-debuginfo-0:1.9.0.16-2.el5_4.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.x86_64" }, "product_reference": "xulrunner-debuginfo-0:1.9.0.16-2.el5_4.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-devel-0:1.9.0.16-2.el5_4.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:xulrunner-devel-0:1.9.0.16-2.el5_4.i386" }, "product_reference": "xulrunner-devel-0:1.9.0.16-2.el5_4.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-devel-0:1.9.0.16-2.el5_4.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:xulrunner-devel-0:1.9.0.16-2.el5_4.ia64" }, "product_reference": "xulrunner-devel-0:1.9.0.16-2.el5_4.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-devel-0:1.9.0.16-2.el5_4.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:xulrunner-devel-0:1.9.0.16-2.el5_4.ppc" }, "product_reference": "xulrunner-devel-0:1.9.0.16-2.el5_4.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-devel-0:1.9.0.16-2.el5_4.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:xulrunner-devel-0:1.9.0.16-2.el5_4.ppc64" }, "product_reference": "xulrunner-devel-0:1.9.0.16-2.el5_4.ppc64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-devel-0:1.9.0.16-2.el5_4.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:xulrunner-devel-0:1.9.0.16-2.el5_4.s390" }, "product_reference": "xulrunner-devel-0:1.9.0.16-2.el5_4.s390", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-devel-0:1.9.0.16-2.el5_4.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:xulrunner-devel-0:1.9.0.16-2.el5_4.s390x" }, "product_reference": "xulrunner-devel-0:1.9.0.16-2.el5_4.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-devel-0:1.9.0.16-2.el5_4.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:xulrunner-devel-0:1.9.0.16-2.el5_4.x86_64" }, "product_reference": "xulrunner-devel-0:1.9.0.16-2.el5_4.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.i386" }, "product_reference": "xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.ia64" }, "product_reference": "xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.ppc" }, "product_reference": "xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.s390x" }, "product_reference": "xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.x86_64" }, "product_reference": "xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:3.0.16-1.el5_4.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:firefox-0:3.0.16-1.el5_4.i386" }, "product_reference": "firefox-0:3.0.16-1.el5_4.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:3.0.16-1.el5_4.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:firefox-0:3.0.16-1.el5_4.ia64" }, "product_reference": "firefox-0:3.0.16-1.el5_4.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:3.0.16-1.el5_4.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:firefox-0:3.0.16-1.el5_4.ppc" }, "product_reference": "firefox-0:3.0.16-1.el5_4.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:3.0.16-1.el5_4.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:firefox-0:3.0.16-1.el5_4.s390" }, "product_reference": "firefox-0:3.0.16-1.el5_4.s390", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:3.0.16-1.el5_4.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:firefox-0:3.0.16-1.el5_4.s390x" }, "product_reference": "firefox-0:3.0.16-1.el5_4.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:3.0.16-1.el5_4.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:firefox-0:3.0.16-1.el5_4.src" }, "product_reference": "firefox-0:3.0.16-1.el5_4.src", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:3.0.16-1.el5_4.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:firefox-0:3.0.16-1.el5_4.x86_64" }, "product_reference": "firefox-0:3.0.16-1.el5_4.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:3.0.16-1.el5_4.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:firefox-debuginfo-0:3.0.16-1.el5_4.i386" }, "product_reference": "firefox-debuginfo-0:3.0.16-1.el5_4.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:3.0.16-1.el5_4.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:firefox-debuginfo-0:3.0.16-1.el5_4.ia64" }, "product_reference": "firefox-debuginfo-0:3.0.16-1.el5_4.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:3.0.16-1.el5_4.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:firefox-debuginfo-0:3.0.16-1.el5_4.ppc" }, "product_reference": "firefox-debuginfo-0:3.0.16-1.el5_4.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:3.0.16-1.el5_4.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:firefox-debuginfo-0:3.0.16-1.el5_4.s390" }, "product_reference": "firefox-debuginfo-0:3.0.16-1.el5_4.s390", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:3.0.16-1.el5_4.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:firefox-debuginfo-0:3.0.16-1.el5_4.s390x" }, "product_reference": "firefox-debuginfo-0:3.0.16-1.el5_4.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:3.0.16-1.el5_4.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:firefox-debuginfo-0:3.0.16-1.el5_4.x86_64" }, "product_reference": "firefox-debuginfo-0:3.0.16-1.el5_4.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-0:1.9.0.16-2.el5_4.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:xulrunner-0:1.9.0.16-2.el5_4.i386" }, "product_reference": "xulrunner-0:1.9.0.16-2.el5_4.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-0:1.9.0.16-2.el5_4.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:xulrunner-0:1.9.0.16-2.el5_4.ia64" }, "product_reference": "xulrunner-0:1.9.0.16-2.el5_4.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-0:1.9.0.16-2.el5_4.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:xulrunner-0:1.9.0.16-2.el5_4.ppc" }, "product_reference": "xulrunner-0:1.9.0.16-2.el5_4.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-0:1.9.0.16-2.el5_4.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:xulrunner-0:1.9.0.16-2.el5_4.ppc64" }, "product_reference": "xulrunner-0:1.9.0.16-2.el5_4.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-0:1.9.0.16-2.el5_4.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:xulrunner-0:1.9.0.16-2.el5_4.s390" }, "product_reference": "xulrunner-0:1.9.0.16-2.el5_4.s390", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-0:1.9.0.16-2.el5_4.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:xulrunner-0:1.9.0.16-2.el5_4.s390x" }, "product_reference": "xulrunner-0:1.9.0.16-2.el5_4.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-0:1.9.0.16-2.el5_4.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:xulrunner-0:1.9.0.16-2.el5_4.src" }, "product_reference": "xulrunner-0:1.9.0.16-2.el5_4.src", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-0:1.9.0.16-2.el5_4.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:xulrunner-0:1.9.0.16-2.el5_4.x86_64" }, "product_reference": "xulrunner-0:1.9.0.16-2.el5_4.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-debuginfo-0:1.9.0.16-2.el5_4.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.i386" }, "product_reference": "xulrunner-debuginfo-0:1.9.0.16-2.el5_4.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ia64" }, "product_reference": "xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ppc" }, "product_reference": "xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ppc64" }, "product_reference": "xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-debuginfo-0:1.9.0.16-2.el5_4.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.s390" }, "product_reference": "xulrunner-debuginfo-0:1.9.0.16-2.el5_4.s390", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-debuginfo-0:1.9.0.16-2.el5_4.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.s390x" }, "product_reference": "xulrunner-debuginfo-0:1.9.0.16-2.el5_4.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-debuginfo-0:1.9.0.16-2.el5_4.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.x86_64" }, "product_reference": "xulrunner-debuginfo-0:1.9.0.16-2.el5_4.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-devel-0:1.9.0.16-2.el5_4.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:xulrunner-devel-0:1.9.0.16-2.el5_4.i386" }, "product_reference": "xulrunner-devel-0:1.9.0.16-2.el5_4.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-devel-0:1.9.0.16-2.el5_4.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:xulrunner-devel-0:1.9.0.16-2.el5_4.ia64" }, "product_reference": "xulrunner-devel-0:1.9.0.16-2.el5_4.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-devel-0:1.9.0.16-2.el5_4.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:xulrunner-devel-0:1.9.0.16-2.el5_4.ppc" }, "product_reference": "xulrunner-devel-0:1.9.0.16-2.el5_4.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-devel-0:1.9.0.16-2.el5_4.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:xulrunner-devel-0:1.9.0.16-2.el5_4.ppc64" }, "product_reference": "xulrunner-devel-0:1.9.0.16-2.el5_4.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-devel-0:1.9.0.16-2.el5_4.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:xulrunner-devel-0:1.9.0.16-2.el5_4.s390" }, "product_reference": "xulrunner-devel-0:1.9.0.16-2.el5_4.s390", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-devel-0:1.9.0.16-2.el5_4.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:xulrunner-devel-0:1.9.0.16-2.el5_4.s390x" }, "product_reference": "xulrunner-devel-0:1.9.0.16-2.el5_4.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-devel-0:1.9.0.16-2.el5_4.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:xulrunner-devel-0:1.9.0.16-2.el5_4.x86_64" }, "product_reference": "xulrunner-devel-0:1.9.0.16-2.el5_4.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.i386" }, "product_reference": "xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.ia64" }, "product_reference": "xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.ppc" }, "product_reference": "xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.s390x" }, "product_reference": "xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.x86_64" }, "product_reference": "xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:3.0.16-1.el5_4.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:firefox-0:3.0.16-1.el5_4.i386" }, "product_reference": "firefox-0:3.0.16-1.el5_4.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:3.0.16-1.el5_4.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:firefox-0:3.0.16-1.el5_4.ia64" }, "product_reference": "firefox-0:3.0.16-1.el5_4.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:3.0.16-1.el5_4.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:firefox-0:3.0.16-1.el5_4.ppc" }, "product_reference": "firefox-0:3.0.16-1.el5_4.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:3.0.16-1.el5_4.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:firefox-0:3.0.16-1.el5_4.s390" }, "product_reference": "firefox-0:3.0.16-1.el5_4.s390", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:3.0.16-1.el5_4.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:firefox-0:3.0.16-1.el5_4.s390x" }, "product_reference": "firefox-0:3.0.16-1.el5_4.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:3.0.16-1.el5_4.src as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:firefox-0:3.0.16-1.el5_4.src" }, "product_reference": "firefox-0:3.0.16-1.el5_4.src", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:3.0.16-1.el5_4.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:firefox-0:3.0.16-1.el5_4.x86_64" }, "product_reference": "firefox-0:3.0.16-1.el5_4.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:3.0.16-1.el5_4.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:firefox-debuginfo-0:3.0.16-1.el5_4.i386" }, "product_reference": "firefox-debuginfo-0:3.0.16-1.el5_4.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:3.0.16-1.el5_4.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:firefox-debuginfo-0:3.0.16-1.el5_4.ia64" }, "product_reference": "firefox-debuginfo-0:3.0.16-1.el5_4.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:3.0.16-1.el5_4.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:firefox-debuginfo-0:3.0.16-1.el5_4.ppc" }, "product_reference": "firefox-debuginfo-0:3.0.16-1.el5_4.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:3.0.16-1.el5_4.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:firefox-debuginfo-0:3.0.16-1.el5_4.s390" }, "product_reference": "firefox-debuginfo-0:3.0.16-1.el5_4.s390", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:3.0.16-1.el5_4.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:firefox-debuginfo-0:3.0.16-1.el5_4.s390x" }, "product_reference": "firefox-debuginfo-0:3.0.16-1.el5_4.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:3.0.16-1.el5_4.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:firefox-debuginfo-0:3.0.16-1.el5_4.x86_64" }, "product_reference": "firefox-debuginfo-0:3.0.16-1.el5_4.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-0:1.9.0.16-2.el5_4.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:xulrunner-0:1.9.0.16-2.el5_4.i386" }, "product_reference": "xulrunner-0:1.9.0.16-2.el5_4.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-0:1.9.0.16-2.el5_4.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:xulrunner-0:1.9.0.16-2.el5_4.ia64" }, "product_reference": "xulrunner-0:1.9.0.16-2.el5_4.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-0:1.9.0.16-2.el5_4.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:xulrunner-0:1.9.0.16-2.el5_4.ppc" }, "product_reference": "xulrunner-0:1.9.0.16-2.el5_4.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-0:1.9.0.16-2.el5_4.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:xulrunner-0:1.9.0.16-2.el5_4.ppc64" }, "product_reference": "xulrunner-0:1.9.0.16-2.el5_4.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-0:1.9.0.16-2.el5_4.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:xulrunner-0:1.9.0.16-2.el5_4.s390" }, "product_reference": "xulrunner-0:1.9.0.16-2.el5_4.s390", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-0:1.9.0.16-2.el5_4.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:xulrunner-0:1.9.0.16-2.el5_4.s390x" }, "product_reference": "xulrunner-0:1.9.0.16-2.el5_4.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-0:1.9.0.16-2.el5_4.src as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:xulrunner-0:1.9.0.16-2.el5_4.src" }, "product_reference": "xulrunner-0:1.9.0.16-2.el5_4.src", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-0:1.9.0.16-2.el5_4.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:xulrunner-0:1.9.0.16-2.el5_4.x86_64" }, "product_reference": "xulrunner-0:1.9.0.16-2.el5_4.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-debuginfo-0:1.9.0.16-2.el5_4.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.i386" }, "product_reference": "xulrunner-debuginfo-0:1.9.0.16-2.el5_4.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ia64" }, "product_reference": "xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ppc" }, "product_reference": "xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ppc64" }, "product_reference": "xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-debuginfo-0:1.9.0.16-2.el5_4.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.s390" }, "product_reference": "xulrunner-debuginfo-0:1.9.0.16-2.el5_4.s390", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-debuginfo-0:1.9.0.16-2.el5_4.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.s390x" }, "product_reference": "xulrunner-debuginfo-0:1.9.0.16-2.el5_4.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-debuginfo-0:1.9.0.16-2.el5_4.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.x86_64" }, "product_reference": "xulrunner-debuginfo-0:1.9.0.16-2.el5_4.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-devel-0:1.9.0.16-2.el5_4.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:xulrunner-devel-0:1.9.0.16-2.el5_4.i386" }, "product_reference": "xulrunner-devel-0:1.9.0.16-2.el5_4.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-devel-0:1.9.0.16-2.el5_4.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:xulrunner-devel-0:1.9.0.16-2.el5_4.ia64" }, "product_reference": "xulrunner-devel-0:1.9.0.16-2.el5_4.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-devel-0:1.9.0.16-2.el5_4.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:xulrunner-devel-0:1.9.0.16-2.el5_4.ppc" }, "product_reference": "xulrunner-devel-0:1.9.0.16-2.el5_4.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-devel-0:1.9.0.16-2.el5_4.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:xulrunner-devel-0:1.9.0.16-2.el5_4.ppc64" }, "product_reference": "xulrunner-devel-0:1.9.0.16-2.el5_4.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-devel-0:1.9.0.16-2.el5_4.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:xulrunner-devel-0:1.9.0.16-2.el5_4.s390" }, "product_reference": "xulrunner-devel-0:1.9.0.16-2.el5_4.s390", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-devel-0:1.9.0.16-2.el5_4.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:xulrunner-devel-0:1.9.0.16-2.el5_4.s390x" }, "product_reference": "xulrunner-devel-0:1.9.0.16-2.el5_4.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-devel-0:1.9.0.16-2.el5_4.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:xulrunner-devel-0:1.9.0.16-2.el5_4.x86_64" }, "product_reference": "xulrunner-devel-0:1.9.0.16-2.el5_4.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.i386" }, "product_reference": "xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.ia64" }, "product_reference": "xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.ppc" }, "product_reference": "xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.s390x" }, "product_reference": "xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.x86_64" }, "product_reference": "xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.x86_64", "relates_to_product_reference": "5Server" } ] }, "vulnerabilities": [ { "cve": "CVE-2009-3979", "discovery_date": "2009-12-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "546694" } ], "notes": [ { "category": "description", "text": "Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.0.16 and 3.5.x before 3.5.6, SeaMonkey before 2.0.1, and Thunderbird allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.", "title": "Vulnerability description" }, { "category": "summary", "text": "Mozilla crash with evidence of memory corruption", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS:firefox-0:3.0.16-4.el4.i386", "4AS:firefox-0:3.0.16-4.el4.ia64", "4AS:firefox-0:3.0.16-4.el4.ppc", "4AS:firefox-0:3.0.16-4.el4.s390", "4AS:firefox-0:3.0.16-4.el4.s390x", "4AS:firefox-0:3.0.16-4.el4.src", "4AS:firefox-0:3.0.16-4.el4.x86_64", "4AS:firefox-debuginfo-0:3.0.16-4.el4.i386", "4AS:firefox-debuginfo-0:3.0.16-4.el4.ia64", "4AS:firefox-debuginfo-0:3.0.16-4.el4.ppc", "4AS:firefox-debuginfo-0:3.0.16-4.el4.s390", "4AS:firefox-debuginfo-0:3.0.16-4.el4.s390x", "4AS:firefox-debuginfo-0:3.0.16-4.el4.x86_64", "4Desktop:firefox-0:3.0.16-4.el4.i386", "4Desktop:firefox-0:3.0.16-4.el4.ia64", "4Desktop:firefox-0:3.0.16-4.el4.ppc", "4Desktop:firefox-0:3.0.16-4.el4.s390", "4Desktop:firefox-0:3.0.16-4.el4.s390x", "4Desktop:firefox-0:3.0.16-4.el4.src", "4Desktop:firefox-0:3.0.16-4.el4.x86_64", "4Desktop:firefox-debuginfo-0:3.0.16-4.el4.i386", "4Desktop:firefox-debuginfo-0:3.0.16-4.el4.ia64", "4Desktop:firefox-debuginfo-0:3.0.16-4.el4.ppc", "4Desktop:firefox-debuginfo-0:3.0.16-4.el4.s390", "4Desktop:firefox-debuginfo-0:3.0.16-4.el4.s390x", "4Desktop:firefox-debuginfo-0:3.0.16-4.el4.x86_64", "4ES:firefox-0:3.0.16-4.el4.i386", "4ES:firefox-0:3.0.16-4.el4.ia64", "4ES:firefox-0:3.0.16-4.el4.ppc", "4ES:firefox-0:3.0.16-4.el4.s390", "4ES:firefox-0:3.0.16-4.el4.s390x", "4ES:firefox-0:3.0.16-4.el4.src", "4ES:firefox-0:3.0.16-4.el4.x86_64", "4ES:firefox-debuginfo-0:3.0.16-4.el4.i386", "4ES:firefox-debuginfo-0:3.0.16-4.el4.ia64", "4ES:firefox-debuginfo-0:3.0.16-4.el4.ppc", "4ES:firefox-debuginfo-0:3.0.16-4.el4.s390", "4ES:firefox-debuginfo-0:3.0.16-4.el4.s390x", "4ES:firefox-debuginfo-0:3.0.16-4.el4.x86_64", "4WS:firefox-0:3.0.16-4.el4.i386", "4WS:firefox-0:3.0.16-4.el4.ia64", "4WS:firefox-0:3.0.16-4.el4.ppc", "4WS:firefox-0:3.0.16-4.el4.s390", "4WS:firefox-0:3.0.16-4.el4.s390x", "4WS:firefox-0:3.0.16-4.el4.src", "4WS:firefox-0:3.0.16-4.el4.x86_64", "4WS:firefox-debuginfo-0:3.0.16-4.el4.i386", "4WS:firefox-debuginfo-0:3.0.16-4.el4.ia64", "4WS:firefox-debuginfo-0:3.0.16-4.el4.ppc", "4WS:firefox-debuginfo-0:3.0.16-4.el4.s390", "4WS:firefox-debuginfo-0:3.0.16-4.el4.s390x", "4WS:firefox-debuginfo-0:3.0.16-4.el4.x86_64", "5Client-Workstation:xulrunner-0:1.9.0.16-2.el5_4.i386", "5Client-Workstation:xulrunner-0:1.9.0.16-2.el5_4.ia64", "5Client-Workstation:xulrunner-0:1.9.0.16-2.el5_4.ppc", "5Client-Workstation:xulrunner-0:1.9.0.16-2.el5_4.ppc64", "5Client-Workstation:xulrunner-0:1.9.0.16-2.el5_4.s390", "5Client-Workstation:xulrunner-0:1.9.0.16-2.el5_4.s390x", "5Client-Workstation:xulrunner-0:1.9.0.16-2.el5_4.src", "5Client-Workstation:xulrunner-0:1.9.0.16-2.el5_4.x86_64", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.i386", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ia64", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ppc", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ppc64", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.s390", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.s390x", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.x86_64", "5Client-Workstation:xulrunner-devel-0:1.9.0.16-2.el5_4.i386", "5Client-Workstation:xulrunner-devel-0:1.9.0.16-2.el5_4.ia64", "5Client-Workstation:xulrunner-devel-0:1.9.0.16-2.el5_4.ppc", "5Client-Workstation:xulrunner-devel-0:1.9.0.16-2.el5_4.ppc64", "5Client-Workstation:xulrunner-devel-0:1.9.0.16-2.el5_4.s390", "5Client-Workstation:xulrunner-devel-0:1.9.0.16-2.el5_4.s390x", "5Client-Workstation:xulrunner-devel-0:1.9.0.16-2.el5_4.x86_64", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.i386", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.ia64", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.ppc", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.s390x", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.x86_64", "5Client:firefox-0:3.0.16-1.el5_4.i386", "5Client:firefox-0:3.0.16-1.el5_4.ia64", "5Client:firefox-0:3.0.16-1.el5_4.ppc", "5Client:firefox-0:3.0.16-1.el5_4.s390", "5Client:firefox-0:3.0.16-1.el5_4.s390x", "5Client:firefox-0:3.0.16-1.el5_4.src", "5Client:firefox-0:3.0.16-1.el5_4.x86_64", "5Client:firefox-debuginfo-0:3.0.16-1.el5_4.i386", "5Client:firefox-debuginfo-0:3.0.16-1.el5_4.ia64", "5Client:firefox-debuginfo-0:3.0.16-1.el5_4.ppc", "5Client:firefox-debuginfo-0:3.0.16-1.el5_4.s390", "5Client:firefox-debuginfo-0:3.0.16-1.el5_4.s390x", "5Client:firefox-debuginfo-0:3.0.16-1.el5_4.x86_64", "5Client:xulrunner-0:1.9.0.16-2.el5_4.i386", "5Client:xulrunner-0:1.9.0.16-2.el5_4.ia64", "5Client:xulrunner-0:1.9.0.16-2.el5_4.ppc", "5Client:xulrunner-0:1.9.0.16-2.el5_4.ppc64", "5Client:xulrunner-0:1.9.0.16-2.el5_4.s390", "5Client:xulrunner-0:1.9.0.16-2.el5_4.s390x", "5Client:xulrunner-0:1.9.0.16-2.el5_4.src", "5Client:xulrunner-0:1.9.0.16-2.el5_4.x86_64", "5Client:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.i386", "5Client:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ia64", "5Client:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ppc", "5Client:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ppc64", "5Client:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.s390", "5Client:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.s390x", "5Client:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.x86_64", "5Client:xulrunner-devel-0:1.9.0.16-2.el5_4.i386", "5Client:xulrunner-devel-0:1.9.0.16-2.el5_4.ia64", "5Client:xulrunner-devel-0:1.9.0.16-2.el5_4.ppc", "5Client:xulrunner-devel-0:1.9.0.16-2.el5_4.ppc64", "5Client:xulrunner-devel-0:1.9.0.16-2.el5_4.s390", "5Client:xulrunner-devel-0:1.9.0.16-2.el5_4.s390x", "5Client:xulrunner-devel-0:1.9.0.16-2.el5_4.x86_64", "5Client:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.i386", "5Client:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.ia64", "5Client:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.ppc", "5Client:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.s390x", "5Client:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.x86_64", "5Server:firefox-0:3.0.16-1.el5_4.i386", "5Server:firefox-0:3.0.16-1.el5_4.ia64", "5Server:firefox-0:3.0.16-1.el5_4.ppc", "5Server:firefox-0:3.0.16-1.el5_4.s390", "5Server:firefox-0:3.0.16-1.el5_4.s390x", "5Server:firefox-0:3.0.16-1.el5_4.src", "5Server:firefox-0:3.0.16-1.el5_4.x86_64", "5Server:firefox-debuginfo-0:3.0.16-1.el5_4.i386", "5Server:firefox-debuginfo-0:3.0.16-1.el5_4.ia64", "5Server:firefox-debuginfo-0:3.0.16-1.el5_4.ppc", "5Server:firefox-debuginfo-0:3.0.16-1.el5_4.s390", "5Server:firefox-debuginfo-0:3.0.16-1.el5_4.s390x", "5Server:firefox-debuginfo-0:3.0.16-1.el5_4.x86_64", "5Server:xulrunner-0:1.9.0.16-2.el5_4.i386", "5Server:xulrunner-0:1.9.0.16-2.el5_4.ia64", "5Server:xulrunner-0:1.9.0.16-2.el5_4.ppc", "5Server:xulrunner-0:1.9.0.16-2.el5_4.ppc64", "5Server:xulrunner-0:1.9.0.16-2.el5_4.s390", "5Server:xulrunner-0:1.9.0.16-2.el5_4.s390x", "5Server:xulrunner-0:1.9.0.16-2.el5_4.src", "5Server:xulrunner-0:1.9.0.16-2.el5_4.x86_64", "5Server:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.i386", "5Server:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ia64", "5Server:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ppc", "5Server:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ppc64", "5Server:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.s390", "5Server:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.s390x", "5Server:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.x86_64", "5Server:xulrunner-devel-0:1.9.0.16-2.el5_4.i386", "5Server:xulrunner-devel-0:1.9.0.16-2.el5_4.ia64", "5Server:xulrunner-devel-0:1.9.0.16-2.el5_4.ppc", "5Server:xulrunner-devel-0:1.9.0.16-2.el5_4.ppc64", "5Server:xulrunner-devel-0:1.9.0.16-2.el5_4.s390", "5Server:xulrunner-devel-0:1.9.0.16-2.el5_4.s390x", "5Server:xulrunner-devel-0:1.9.0.16-2.el5_4.x86_64", "5Server:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.i386", "5Server:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.ia64", "5Server:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.ppc", "5Server:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.s390x", "5Server:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-3979" }, { "category": "external", "summary": "RHBZ#546694", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=546694" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3979", "url": "https://www.cve.org/CVERecord?id=CVE-2009-3979" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3979", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3979" } ], "release_date": "2009-12-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-12-16T04:56:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS:firefox-0:3.0.16-4.el4.i386", "4AS:firefox-0:3.0.16-4.el4.ia64", "4AS:firefox-0:3.0.16-4.el4.ppc", "4AS:firefox-0:3.0.16-4.el4.s390", "4AS:firefox-0:3.0.16-4.el4.s390x", "4AS:firefox-0:3.0.16-4.el4.src", "4AS:firefox-0:3.0.16-4.el4.x86_64", "4AS:firefox-debuginfo-0:3.0.16-4.el4.i386", "4AS:firefox-debuginfo-0:3.0.16-4.el4.ia64", "4AS:firefox-debuginfo-0:3.0.16-4.el4.ppc", "4AS:firefox-debuginfo-0:3.0.16-4.el4.s390", "4AS:firefox-debuginfo-0:3.0.16-4.el4.s390x", "4AS:firefox-debuginfo-0:3.0.16-4.el4.x86_64", "4Desktop:firefox-0:3.0.16-4.el4.i386", "4Desktop:firefox-0:3.0.16-4.el4.ia64", "4Desktop:firefox-0:3.0.16-4.el4.ppc", "4Desktop:firefox-0:3.0.16-4.el4.s390", "4Desktop:firefox-0:3.0.16-4.el4.s390x", "4Desktop:firefox-0:3.0.16-4.el4.src", "4Desktop:firefox-0:3.0.16-4.el4.x86_64", "4Desktop:firefox-debuginfo-0:3.0.16-4.el4.i386", "4Desktop:firefox-debuginfo-0:3.0.16-4.el4.ia64", "4Desktop:firefox-debuginfo-0:3.0.16-4.el4.ppc", "4Desktop:firefox-debuginfo-0:3.0.16-4.el4.s390", "4Desktop:firefox-debuginfo-0:3.0.16-4.el4.s390x", "4Desktop:firefox-debuginfo-0:3.0.16-4.el4.x86_64", "4ES:firefox-0:3.0.16-4.el4.i386", "4ES:firefox-0:3.0.16-4.el4.ia64", "4ES:firefox-0:3.0.16-4.el4.ppc", "4ES:firefox-0:3.0.16-4.el4.s390", "4ES:firefox-0:3.0.16-4.el4.s390x", "4ES:firefox-0:3.0.16-4.el4.src", "4ES:firefox-0:3.0.16-4.el4.x86_64", "4ES:firefox-debuginfo-0:3.0.16-4.el4.i386", "4ES:firefox-debuginfo-0:3.0.16-4.el4.ia64", "4ES:firefox-debuginfo-0:3.0.16-4.el4.ppc", "4ES:firefox-debuginfo-0:3.0.16-4.el4.s390", "4ES:firefox-debuginfo-0:3.0.16-4.el4.s390x", "4ES:firefox-debuginfo-0:3.0.16-4.el4.x86_64", "4WS:firefox-0:3.0.16-4.el4.i386", "4WS:firefox-0:3.0.16-4.el4.ia64", "4WS:firefox-0:3.0.16-4.el4.ppc", "4WS:firefox-0:3.0.16-4.el4.s390", "4WS:firefox-0:3.0.16-4.el4.s390x", "4WS:firefox-0:3.0.16-4.el4.src", "4WS:firefox-0:3.0.16-4.el4.x86_64", "4WS:firefox-debuginfo-0:3.0.16-4.el4.i386", "4WS:firefox-debuginfo-0:3.0.16-4.el4.ia64", "4WS:firefox-debuginfo-0:3.0.16-4.el4.ppc", "4WS:firefox-debuginfo-0:3.0.16-4.el4.s390", "4WS:firefox-debuginfo-0:3.0.16-4.el4.s390x", "4WS:firefox-debuginfo-0:3.0.16-4.el4.x86_64", "5Client-Workstation:xulrunner-0:1.9.0.16-2.el5_4.i386", "5Client-Workstation:xulrunner-0:1.9.0.16-2.el5_4.ia64", "5Client-Workstation:xulrunner-0:1.9.0.16-2.el5_4.ppc", "5Client-Workstation:xulrunner-0:1.9.0.16-2.el5_4.ppc64", "5Client-Workstation:xulrunner-0:1.9.0.16-2.el5_4.s390", "5Client-Workstation:xulrunner-0:1.9.0.16-2.el5_4.s390x", "5Client-Workstation:xulrunner-0:1.9.0.16-2.el5_4.src", "5Client-Workstation:xulrunner-0:1.9.0.16-2.el5_4.x86_64", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.i386", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ia64", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ppc", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ppc64", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.s390", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.s390x", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.x86_64", "5Client-Workstation:xulrunner-devel-0:1.9.0.16-2.el5_4.i386", "5Client-Workstation:xulrunner-devel-0:1.9.0.16-2.el5_4.ia64", "5Client-Workstation:xulrunner-devel-0:1.9.0.16-2.el5_4.ppc", "5Client-Workstation:xulrunner-devel-0:1.9.0.16-2.el5_4.ppc64", "5Client-Workstation:xulrunner-devel-0:1.9.0.16-2.el5_4.s390", "5Client-Workstation:xulrunner-devel-0:1.9.0.16-2.el5_4.s390x", "5Client-Workstation:xulrunner-devel-0:1.9.0.16-2.el5_4.x86_64", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.i386", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.ia64", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.ppc", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.s390x", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.x86_64", "5Client:firefox-0:3.0.16-1.el5_4.i386", "5Client:firefox-0:3.0.16-1.el5_4.ia64", "5Client:firefox-0:3.0.16-1.el5_4.ppc", "5Client:firefox-0:3.0.16-1.el5_4.s390", "5Client:firefox-0:3.0.16-1.el5_4.s390x", "5Client:firefox-0:3.0.16-1.el5_4.src", "5Client:firefox-0:3.0.16-1.el5_4.x86_64", "5Client:firefox-debuginfo-0:3.0.16-1.el5_4.i386", "5Client:firefox-debuginfo-0:3.0.16-1.el5_4.ia64", "5Client:firefox-debuginfo-0:3.0.16-1.el5_4.ppc", "5Client:firefox-debuginfo-0:3.0.16-1.el5_4.s390", "5Client:firefox-debuginfo-0:3.0.16-1.el5_4.s390x", "5Client:firefox-debuginfo-0:3.0.16-1.el5_4.x86_64", "5Client:xulrunner-0:1.9.0.16-2.el5_4.i386", "5Client:xulrunner-0:1.9.0.16-2.el5_4.ia64", "5Client:xulrunner-0:1.9.0.16-2.el5_4.ppc", "5Client:xulrunner-0:1.9.0.16-2.el5_4.ppc64", "5Client:xulrunner-0:1.9.0.16-2.el5_4.s390", "5Client:xulrunner-0:1.9.0.16-2.el5_4.s390x", "5Client:xulrunner-0:1.9.0.16-2.el5_4.src", "5Client:xulrunner-0:1.9.0.16-2.el5_4.x86_64", "5Client:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.i386", "5Client:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ia64", "5Client:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ppc", "5Client:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ppc64", "5Client:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.s390", "5Client:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.s390x", "5Client:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.x86_64", "5Client:xulrunner-devel-0:1.9.0.16-2.el5_4.i386", "5Client:xulrunner-devel-0:1.9.0.16-2.el5_4.ia64", "5Client:xulrunner-devel-0:1.9.0.16-2.el5_4.ppc", "5Client:xulrunner-devel-0:1.9.0.16-2.el5_4.ppc64", "5Client:xulrunner-devel-0:1.9.0.16-2.el5_4.s390", "5Client:xulrunner-devel-0:1.9.0.16-2.el5_4.s390x", "5Client:xulrunner-devel-0:1.9.0.16-2.el5_4.x86_64", "5Client:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.i386", "5Client:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.ia64", "5Client:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.ppc", "5Client:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.s390x", "5Client:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.x86_64", "5Server:firefox-0:3.0.16-1.el5_4.i386", "5Server:firefox-0:3.0.16-1.el5_4.ia64", "5Server:firefox-0:3.0.16-1.el5_4.ppc", "5Server:firefox-0:3.0.16-1.el5_4.s390", "5Server:firefox-0:3.0.16-1.el5_4.s390x", "5Server:firefox-0:3.0.16-1.el5_4.src", "5Server:firefox-0:3.0.16-1.el5_4.x86_64", "5Server:firefox-debuginfo-0:3.0.16-1.el5_4.i386", "5Server:firefox-debuginfo-0:3.0.16-1.el5_4.ia64", "5Server:firefox-debuginfo-0:3.0.16-1.el5_4.ppc", "5Server:firefox-debuginfo-0:3.0.16-1.el5_4.s390", "5Server:firefox-debuginfo-0:3.0.16-1.el5_4.s390x", "5Server:firefox-debuginfo-0:3.0.16-1.el5_4.x86_64", "5Server:xulrunner-0:1.9.0.16-2.el5_4.i386", "5Server:xulrunner-0:1.9.0.16-2.el5_4.ia64", "5Server:xulrunner-0:1.9.0.16-2.el5_4.ppc", "5Server:xulrunner-0:1.9.0.16-2.el5_4.ppc64", "5Server:xulrunner-0:1.9.0.16-2.el5_4.s390", "5Server:xulrunner-0:1.9.0.16-2.el5_4.s390x", "5Server:xulrunner-0:1.9.0.16-2.el5_4.src", "5Server:xulrunner-0:1.9.0.16-2.el5_4.x86_64", "5Server:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.i386", "5Server:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ia64", "5Server:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ppc", "5Server:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ppc64", "5Server:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.s390", "5Server:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.s390x", "5Server:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.x86_64", "5Server:xulrunner-devel-0:1.9.0.16-2.el5_4.i386", "5Server:xulrunner-devel-0:1.9.0.16-2.el5_4.ia64", "5Server:xulrunner-devel-0:1.9.0.16-2.el5_4.ppc", "5Server:xulrunner-devel-0:1.9.0.16-2.el5_4.ppc64", "5Server:xulrunner-devel-0:1.9.0.16-2.el5_4.s390", "5Server:xulrunner-devel-0:1.9.0.16-2.el5_4.s390x", "5Server:xulrunner-devel-0:1.9.0.16-2.el5_4.x86_64", "5Server:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.i386", "5Server:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.ia64", "5Server:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.ppc", "5Server:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.s390x", "5Server:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1674" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS:firefox-0:3.0.16-4.el4.i386", "4AS:firefox-0:3.0.16-4.el4.ia64", "4AS:firefox-0:3.0.16-4.el4.ppc", "4AS:firefox-0:3.0.16-4.el4.s390", "4AS:firefox-0:3.0.16-4.el4.s390x", "4AS:firefox-0:3.0.16-4.el4.src", "4AS:firefox-0:3.0.16-4.el4.x86_64", "4AS:firefox-debuginfo-0:3.0.16-4.el4.i386", "4AS:firefox-debuginfo-0:3.0.16-4.el4.ia64", "4AS:firefox-debuginfo-0:3.0.16-4.el4.ppc", "4AS:firefox-debuginfo-0:3.0.16-4.el4.s390", "4AS:firefox-debuginfo-0:3.0.16-4.el4.s390x", "4AS:firefox-debuginfo-0:3.0.16-4.el4.x86_64", "4Desktop:firefox-0:3.0.16-4.el4.i386", "4Desktop:firefox-0:3.0.16-4.el4.ia64", "4Desktop:firefox-0:3.0.16-4.el4.ppc", "4Desktop:firefox-0:3.0.16-4.el4.s390", "4Desktop:firefox-0:3.0.16-4.el4.s390x", "4Desktop:firefox-0:3.0.16-4.el4.src", "4Desktop:firefox-0:3.0.16-4.el4.x86_64", "4Desktop:firefox-debuginfo-0:3.0.16-4.el4.i386", "4Desktop:firefox-debuginfo-0:3.0.16-4.el4.ia64", "4Desktop:firefox-debuginfo-0:3.0.16-4.el4.ppc", "4Desktop:firefox-debuginfo-0:3.0.16-4.el4.s390", "4Desktop:firefox-debuginfo-0:3.0.16-4.el4.s390x", "4Desktop:firefox-debuginfo-0:3.0.16-4.el4.x86_64", "4ES:firefox-0:3.0.16-4.el4.i386", "4ES:firefox-0:3.0.16-4.el4.ia64", "4ES:firefox-0:3.0.16-4.el4.ppc", "4ES:firefox-0:3.0.16-4.el4.s390", "4ES:firefox-0:3.0.16-4.el4.s390x", "4ES:firefox-0:3.0.16-4.el4.src", "4ES:firefox-0:3.0.16-4.el4.x86_64", "4ES:firefox-debuginfo-0:3.0.16-4.el4.i386", "4ES:firefox-debuginfo-0:3.0.16-4.el4.ia64", "4ES:firefox-debuginfo-0:3.0.16-4.el4.ppc", "4ES:firefox-debuginfo-0:3.0.16-4.el4.s390", "4ES:firefox-debuginfo-0:3.0.16-4.el4.s390x", "4ES:firefox-debuginfo-0:3.0.16-4.el4.x86_64", "4WS:firefox-0:3.0.16-4.el4.i386", "4WS:firefox-0:3.0.16-4.el4.ia64", "4WS:firefox-0:3.0.16-4.el4.ppc", "4WS:firefox-0:3.0.16-4.el4.s390", "4WS:firefox-0:3.0.16-4.el4.s390x", "4WS:firefox-0:3.0.16-4.el4.src", "4WS:firefox-0:3.0.16-4.el4.x86_64", "4WS:firefox-debuginfo-0:3.0.16-4.el4.i386", "4WS:firefox-debuginfo-0:3.0.16-4.el4.ia64", "4WS:firefox-debuginfo-0:3.0.16-4.el4.ppc", "4WS:firefox-debuginfo-0:3.0.16-4.el4.s390", "4WS:firefox-debuginfo-0:3.0.16-4.el4.s390x", "4WS:firefox-debuginfo-0:3.0.16-4.el4.x86_64", "5Client-Workstation:xulrunner-0:1.9.0.16-2.el5_4.i386", "5Client-Workstation:xulrunner-0:1.9.0.16-2.el5_4.ia64", "5Client-Workstation:xulrunner-0:1.9.0.16-2.el5_4.ppc", "5Client-Workstation:xulrunner-0:1.9.0.16-2.el5_4.ppc64", "5Client-Workstation:xulrunner-0:1.9.0.16-2.el5_4.s390", "5Client-Workstation:xulrunner-0:1.9.0.16-2.el5_4.s390x", "5Client-Workstation:xulrunner-0:1.9.0.16-2.el5_4.src", "5Client-Workstation:xulrunner-0:1.9.0.16-2.el5_4.x86_64", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.i386", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ia64", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ppc", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ppc64", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.s390", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.s390x", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.x86_64", "5Client-Workstation:xulrunner-devel-0:1.9.0.16-2.el5_4.i386", "5Client-Workstation:xulrunner-devel-0:1.9.0.16-2.el5_4.ia64", "5Client-Workstation:xulrunner-devel-0:1.9.0.16-2.el5_4.ppc", "5Client-Workstation:xulrunner-devel-0:1.9.0.16-2.el5_4.ppc64", "5Client-Workstation:xulrunner-devel-0:1.9.0.16-2.el5_4.s390", "5Client-Workstation:xulrunner-devel-0:1.9.0.16-2.el5_4.s390x", "5Client-Workstation:xulrunner-devel-0:1.9.0.16-2.el5_4.x86_64", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.i386", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.ia64", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.ppc", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.s390x", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.x86_64", "5Client:firefox-0:3.0.16-1.el5_4.i386", "5Client:firefox-0:3.0.16-1.el5_4.ia64", "5Client:firefox-0:3.0.16-1.el5_4.ppc", "5Client:firefox-0:3.0.16-1.el5_4.s390", "5Client:firefox-0:3.0.16-1.el5_4.s390x", "5Client:firefox-0:3.0.16-1.el5_4.src", "5Client:firefox-0:3.0.16-1.el5_4.x86_64", "5Client:firefox-debuginfo-0:3.0.16-1.el5_4.i386", "5Client:firefox-debuginfo-0:3.0.16-1.el5_4.ia64", "5Client:firefox-debuginfo-0:3.0.16-1.el5_4.ppc", "5Client:firefox-debuginfo-0:3.0.16-1.el5_4.s390", "5Client:firefox-debuginfo-0:3.0.16-1.el5_4.s390x", "5Client:firefox-debuginfo-0:3.0.16-1.el5_4.x86_64", "5Client:xulrunner-0:1.9.0.16-2.el5_4.i386", "5Client:xulrunner-0:1.9.0.16-2.el5_4.ia64", "5Client:xulrunner-0:1.9.0.16-2.el5_4.ppc", "5Client:xulrunner-0:1.9.0.16-2.el5_4.ppc64", "5Client:xulrunner-0:1.9.0.16-2.el5_4.s390", "5Client:xulrunner-0:1.9.0.16-2.el5_4.s390x", "5Client:xulrunner-0:1.9.0.16-2.el5_4.src", "5Client:xulrunner-0:1.9.0.16-2.el5_4.x86_64", "5Client:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.i386", "5Client:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ia64", "5Client:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ppc", "5Client:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ppc64", "5Client:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.s390", "5Client:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.s390x", "5Client:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.x86_64", "5Client:xulrunner-devel-0:1.9.0.16-2.el5_4.i386", "5Client:xulrunner-devel-0:1.9.0.16-2.el5_4.ia64", "5Client:xulrunner-devel-0:1.9.0.16-2.el5_4.ppc", "5Client:xulrunner-devel-0:1.9.0.16-2.el5_4.ppc64", "5Client:xulrunner-devel-0:1.9.0.16-2.el5_4.s390", "5Client:xulrunner-devel-0:1.9.0.16-2.el5_4.s390x", "5Client:xulrunner-devel-0:1.9.0.16-2.el5_4.x86_64", "5Client:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.i386", "5Client:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.ia64", "5Client:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.ppc", "5Client:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.s390x", "5Client:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.x86_64", "5Server:firefox-0:3.0.16-1.el5_4.i386", "5Server:firefox-0:3.0.16-1.el5_4.ia64", "5Server:firefox-0:3.0.16-1.el5_4.ppc", "5Server:firefox-0:3.0.16-1.el5_4.s390", "5Server:firefox-0:3.0.16-1.el5_4.s390x", "5Server:firefox-0:3.0.16-1.el5_4.src", "5Server:firefox-0:3.0.16-1.el5_4.x86_64", "5Server:firefox-debuginfo-0:3.0.16-1.el5_4.i386", "5Server:firefox-debuginfo-0:3.0.16-1.el5_4.ia64", "5Server:firefox-debuginfo-0:3.0.16-1.el5_4.ppc", "5Server:firefox-debuginfo-0:3.0.16-1.el5_4.s390", "5Server:firefox-debuginfo-0:3.0.16-1.el5_4.s390x", "5Server:firefox-debuginfo-0:3.0.16-1.el5_4.x86_64", "5Server:xulrunner-0:1.9.0.16-2.el5_4.i386", "5Server:xulrunner-0:1.9.0.16-2.el5_4.ia64", "5Server:xulrunner-0:1.9.0.16-2.el5_4.ppc", "5Server:xulrunner-0:1.9.0.16-2.el5_4.ppc64", "5Server:xulrunner-0:1.9.0.16-2.el5_4.s390", "5Server:xulrunner-0:1.9.0.16-2.el5_4.s390x", "5Server:xulrunner-0:1.9.0.16-2.el5_4.src", "5Server:xulrunner-0:1.9.0.16-2.el5_4.x86_64", "5Server:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.i386", "5Server:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ia64", "5Server:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ppc", "5Server:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ppc64", "5Server:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.s390", "5Server:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.s390x", "5Server:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.x86_64", "5Server:xulrunner-devel-0:1.9.0.16-2.el5_4.i386", "5Server:xulrunner-devel-0:1.9.0.16-2.el5_4.ia64", "5Server:xulrunner-devel-0:1.9.0.16-2.el5_4.ppc", "5Server:xulrunner-devel-0:1.9.0.16-2.el5_4.ppc64", "5Server:xulrunner-devel-0:1.9.0.16-2.el5_4.s390", "5Server:xulrunner-devel-0:1.9.0.16-2.el5_4.s390x", "5Server:xulrunner-devel-0:1.9.0.16-2.el5_4.x86_64", "5Server:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.i386", "5Server:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.ia64", "5Server:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.ppc", "5Server:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.s390x", "5Server:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "Mozilla crash with evidence of memory corruption" }, { "cve": "CVE-2009-3981", "discovery_date": "2009-12-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "546713" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the browser engine in Mozilla Firefox before 3.0.16, SeaMonkey before 2.0.1, and Thunderbird allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.", "title": "Vulnerability description" }, { "category": "summary", "text": "Mozilla crashes with evidence of memory corruption", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS:firefox-0:3.0.16-4.el4.i386", "4AS:firefox-0:3.0.16-4.el4.ia64", "4AS:firefox-0:3.0.16-4.el4.ppc", "4AS:firefox-0:3.0.16-4.el4.s390", "4AS:firefox-0:3.0.16-4.el4.s390x", "4AS:firefox-0:3.0.16-4.el4.src", "4AS:firefox-0:3.0.16-4.el4.x86_64", "4AS:firefox-debuginfo-0:3.0.16-4.el4.i386", "4AS:firefox-debuginfo-0:3.0.16-4.el4.ia64", "4AS:firefox-debuginfo-0:3.0.16-4.el4.ppc", "4AS:firefox-debuginfo-0:3.0.16-4.el4.s390", "4AS:firefox-debuginfo-0:3.0.16-4.el4.s390x", "4AS:firefox-debuginfo-0:3.0.16-4.el4.x86_64", "4Desktop:firefox-0:3.0.16-4.el4.i386", "4Desktop:firefox-0:3.0.16-4.el4.ia64", "4Desktop:firefox-0:3.0.16-4.el4.ppc", "4Desktop:firefox-0:3.0.16-4.el4.s390", "4Desktop:firefox-0:3.0.16-4.el4.s390x", "4Desktop:firefox-0:3.0.16-4.el4.src", "4Desktop:firefox-0:3.0.16-4.el4.x86_64", "4Desktop:firefox-debuginfo-0:3.0.16-4.el4.i386", "4Desktop:firefox-debuginfo-0:3.0.16-4.el4.ia64", "4Desktop:firefox-debuginfo-0:3.0.16-4.el4.ppc", "4Desktop:firefox-debuginfo-0:3.0.16-4.el4.s390", "4Desktop:firefox-debuginfo-0:3.0.16-4.el4.s390x", "4Desktop:firefox-debuginfo-0:3.0.16-4.el4.x86_64", "4ES:firefox-0:3.0.16-4.el4.i386", "4ES:firefox-0:3.0.16-4.el4.ia64", "4ES:firefox-0:3.0.16-4.el4.ppc", "4ES:firefox-0:3.0.16-4.el4.s390", "4ES:firefox-0:3.0.16-4.el4.s390x", "4ES:firefox-0:3.0.16-4.el4.src", "4ES:firefox-0:3.0.16-4.el4.x86_64", "4ES:firefox-debuginfo-0:3.0.16-4.el4.i386", "4ES:firefox-debuginfo-0:3.0.16-4.el4.ia64", "4ES:firefox-debuginfo-0:3.0.16-4.el4.ppc", "4ES:firefox-debuginfo-0:3.0.16-4.el4.s390", "4ES:firefox-debuginfo-0:3.0.16-4.el4.s390x", "4ES:firefox-debuginfo-0:3.0.16-4.el4.x86_64", "4WS:firefox-0:3.0.16-4.el4.i386", "4WS:firefox-0:3.0.16-4.el4.ia64", "4WS:firefox-0:3.0.16-4.el4.ppc", "4WS:firefox-0:3.0.16-4.el4.s390", "4WS:firefox-0:3.0.16-4.el4.s390x", "4WS:firefox-0:3.0.16-4.el4.src", "4WS:firefox-0:3.0.16-4.el4.x86_64", "4WS:firefox-debuginfo-0:3.0.16-4.el4.i386", "4WS:firefox-debuginfo-0:3.0.16-4.el4.ia64", "4WS:firefox-debuginfo-0:3.0.16-4.el4.ppc", "4WS:firefox-debuginfo-0:3.0.16-4.el4.s390", "4WS:firefox-debuginfo-0:3.0.16-4.el4.s390x", "4WS:firefox-debuginfo-0:3.0.16-4.el4.x86_64", "5Client-Workstation:xulrunner-0:1.9.0.16-2.el5_4.i386", "5Client-Workstation:xulrunner-0:1.9.0.16-2.el5_4.ia64", "5Client-Workstation:xulrunner-0:1.9.0.16-2.el5_4.ppc", "5Client-Workstation:xulrunner-0:1.9.0.16-2.el5_4.ppc64", "5Client-Workstation:xulrunner-0:1.9.0.16-2.el5_4.s390", "5Client-Workstation:xulrunner-0:1.9.0.16-2.el5_4.s390x", "5Client-Workstation:xulrunner-0:1.9.0.16-2.el5_4.src", "5Client-Workstation:xulrunner-0:1.9.0.16-2.el5_4.x86_64", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.i386", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ia64", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ppc", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ppc64", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.s390", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.s390x", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.x86_64", "5Client-Workstation:xulrunner-devel-0:1.9.0.16-2.el5_4.i386", "5Client-Workstation:xulrunner-devel-0:1.9.0.16-2.el5_4.ia64", "5Client-Workstation:xulrunner-devel-0:1.9.0.16-2.el5_4.ppc", "5Client-Workstation:xulrunner-devel-0:1.9.0.16-2.el5_4.ppc64", "5Client-Workstation:xulrunner-devel-0:1.9.0.16-2.el5_4.s390", "5Client-Workstation:xulrunner-devel-0:1.9.0.16-2.el5_4.s390x", "5Client-Workstation:xulrunner-devel-0:1.9.0.16-2.el5_4.x86_64", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.i386", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.ia64", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.ppc", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.s390x", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.x86_64", "5Client:firefox-0:3.0.16-1.el5_4.i386", "5Client:firefox-0:3.0.16-1.el5_4.ia64", "5Client:firefox-0:3.0.16-1.el5_4.ppc", "5Client:firefox-0:3.0.16-1.el5_4.s390", "5Client:firefox-0:3.0.16-1.el5_4.s390x", "5Client:firefox-0:3.0.16-1.el5_4.src", "5Client:firefox-0:3.0.16-1.el5_4.x86_64", "5Client:firefox-debuginfo-0:3.0.16-1.el5_4.i386", "5Client:firefox-debuginfo-0:3.0.16-1.el5_4.ia64", "5Client:firefox-debuginfo-0:3.0.16-1.el5_4.ppc", "5Client:firefox-debuginfo-0:3.0.16-1.el5_4.s390", "5Client:firefox-debuginfo-0:3.0.16-1.el5_4.s390x", "5Client:firefox-debuginfo-0:3.0.16-1.el5_4.x86_64", "5Client:xulrunner-0:1.9.0.16-2.el5_4.i386", "5Client:xulrunner-0:1.9.0.16-2.el5_4.ia64", "5Client:xulrunner-0:1.9.0.16-2.el5_4.ppc", "5Client:xulrunner-0:1.9.0.16-2.el5_4.ppc64", "5Client:xulrunner-0:1.9.0.16-2.el5_4.s390", "5Client:xulrunner-0:1.9.0.16-2.el5_4.s390x", "5Client:xulrunner-0:1.9.0.16-2.el5_4.src", "5Client:xulrunner-0:1.9.0.16-2.el5_4.x86_64", "5Client:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.i386", "5Client:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ia64", "5Client:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ppc", "5Client:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ppc64", "5Client:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.s390", "5Client:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.s390x", "5Client:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.x86_64", "5Client:xulrunner-devel-0:1.9.0.16-2.el5_4.i386", "5Client:xulrunner-devel-0:1.9.0.16-2.el5_4.ia64", "5Client:xulrunner-devel-0:1.9.0.16-2.el5_4.ppc", "5Client:xulrunner-devel-0:1.9.0.16-2.el5_4.ppc64", "5Client:xulrunner-devel-0:1.9.0.16-2.el5_4.s390", "5Client:xulrunner-devel-0:1.9.0.16-2.el5_4.s390x", "5Client:xulrunner-devel-0:1.9.0.16-2.el5_4.x86_64", "5Client:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.i386", "5Client:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.ia64", "5Client:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.ppc", "5Client:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.s390x", "5Client:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.x86_64", "5Server:firefox-0:3.0.16-1.el5_4.i386", "5Server:firefox-0:3.0.16-1.el5_4.ia64", "5Server:firefox-0:3.0.16-1.el5_4.ppc", "5Server:firefox-0:3.0.16-1.el5_4.s390", "5Server:firefox-0:3.0.16-1.el5_4.s390x", "5Server:firefox-0:3.0.16-1.el5_4.src", "5Server:firefox-0:3.0.16-1.el5_4.x86_64", "5Server:firefox-debuginfo-0:3.0.16-1.el5_4.i386", "5Server:firefox-debuginfo-0:3.0.16-1.el5_4.ia64", "5Server:firefox-debuginfo-0:3.0.16-1.el5_4.ppc", "5Server:firefox-debuginfo-0:3.0.16-1.el5_4.s390", "5Server:firefox-debuginfo-0:3.0.16-1.el5_4.s390x", "5Server:firefox-debuginfo-0:3.0.16-1.el5_4.x86_64", "5Server:xulrunner-0:1.9.0.16-2.el5_4.i386", "5Server:xulrunner-0:1.9.0.16-2.el5_4.ia64", "5Server:xulrunner-0:1.9.0.16-2.el5_4.ppc", "5Server:xulrunner-0:1.9.0.16-2.el5_4.ppc64", "5Server:xulrunner-0:1.9.0.16-2.el5_4.s390", "5Server:xulrunner-0:1.9.0.16-2.el5_4.s390x", "5Server:xulrunner-0:1.9.0.16-2.el5_4.src", "5Server:xulrunner-0:1.9.0.16-2.el5_4.x86_64", "5Server:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.i386", "5Server:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ia64", "5Server:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ppc", "5Server:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ppc64", "5Server:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.s390", "5Server:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.s390x", "5Server:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.x86_64", "5Server:xulrunner-devel-0:1.9.0.16-2.el5_4.i386", "5Server:xulrunner-devel-0:1.9.0.16-2.el5_4.ia64", "5Server:xulrunner-devel-0:1.9.0.16-2.el5_4.ppc", "5Server:xulrunner-devel-0:1.9.0.16-2.el5_4.ppc64", "5Server:xulrunner-devel-0:1.9.0.16-2.el5_4.s390", "5Server:xulrunner-devel-0:1.9.0.16-2.el5_4.s390x", "5Server:xulrunner-devel-0:1.9.0.16-2.el5_4.x86_64", "5Server:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.i386", "5Server:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.ia64", "5Server:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.ppc", "5Server:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.s390x", "5Server:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-3981" }, { "category": "external", "summary": "RHBZ#546713", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=546713" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3981", "url": "https://www.cve.org/CVERecord?id=CVE-2009-3981" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3981", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3981" } ], "release_date": "2009-12-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-12-16T04:56:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS:firefox-0:3.0.16-4.el4.i386", "4AS:firefox-0:3.0.16-4.el4.ia64", "4AS:firefox-0:3.0.16-4.el4.ppc", "4AS:firefox-0:3.0.16-4.el4.s390", "4AS:firefox-0:3.0.16-4.el4.s390x", "4AS:firefox-0:3.0.16-4.el4.src", "4AS:firefox-0:3.0.16-4.el4.x86_64", "4AS:firefox-debuginfo-0:3.0.16-4.el4.i386", "4AS:firefox-debuginfo-0:3.0.16-4.el4.ia64", "4AS:firefox-debuginfo-0:3.0.16-4.el4.ppc", "4AS:firefox-debuginfo-0:3.0.16-4.el4.s390", "4AS:firefox-debuginfo-0:3.0.16-4.el4.s390x", "4AS:firefox-debuginfo-0:3.0.16-4.el4.x86_64", "4Desktop:firefox-0:3.0.16-4.el4.i386", "4Desktop:firefox-0:3.0.16-4.el4.ia64", "4Desktop:firefox-0:3.0.16-4.el4.ppc", "4Desktop:firefox-0:3.0.16-4.el4.s390", "4Desktop:firefox-0:3.0.16-4.el4.s390x", "4Desktop:firefox-0:3.0.16-4.el4.src", "4Desktop:firefox-0:3.0.16-4.el4.x86_64", "4Desktop:firefox-debuginfo-0:3.0.16-4.el4.i386", "4Desktop:firefox-debuginfo-0:3.0.16-4.el4.ia64", "4Desktop:firefox-debuginfo-0:3.0.16-4.el4.ppc", "4Desktop:firefox-debuginfo-0:3.0.16-4.el4.s390", "4Desktop:firefox-debuginfo-0:3.0.16-4.el4.s390x", "4Desktop:firefox-debuginfo-0:3.0.16-4.el4.x86_64", "4ES:firefox-0:3.0.16-4.el4.i386", "4ES:firefox-0:3.0.16-4.el4.ia64", "4ES:firefox-0:3.0.16-4.el4.ppc", "4ES:firefox-0:3.0.16-4.el4.s390", "4ES:firefox-0:3.0.16-4.el4.s390x", "4ES:firefox-0:3.0.16-4.el4.src", "4ES:firefox-0:3.0.16-4.el4.x86_64", "4ES:firefox-debuginfo-0:3.0.16-4.el4.i386", "4ES:firefox-debuginfo-0:3.0.16-4.el4.ia64", "4ES:firefox-debuginfo-0:3.0.16-4.el4.ppc", "4ES:firefox-debuginfo-0:3.0.16-4.el4.s390", "4ES:firefox-debuginfo-0:3.0.16-4.el4.s390x", "4ES:firefox-debuginfo-0:3.0.16-4.el4.x86_64", "4WS:firefox-0:3.0.16-4.el4.i386", "4WS:firefox-0:3.0.16-4.el4.ia64", "4WS:firefox-0:3.0.16-4.el4.ppc", "4WS:firefox-0:3.0.16-4.el4.s390", "4WS:firefox-0:3.0.16-4.el4.s390x", "4WS:firefox-0:3.0.16-4.el4.src", "4WS:firefox-0:3.0.16-4.el4.x86_64", "4WS:firefox-debuginfo-0:3.0.16-4.el4.i386", "4WS:firefox-debuginfo-0:3.0.16-4.el4.ia64", "4WS:firefox-debuginfo-0:3.0.16-4.el4.ppc", "4WS:firefox-debuginfo-0:3.0.16-4.el4.s390", "4WS:firefox-debuginfo-0:3.0.16-4.el4.s390x", "4WS:firefox-debuginfo-0:3.0.16-4.el4.x86_64", "5Client-Workstation:xulrunner-0:1.9.0.16-2.el5_4.i386", "5Client-Workstation:xulrunner-0:1.9.0.16-2.el5_4.ia64", "5Client-Workstation:xulrunner-0:1.9.0.16-2.el5_4.ppc", "5Client-Workstation:xulrunner-0:1.9.0.16-2.el5_4.ppc64", "5Client-Workstation:xulrunner-0:1.9.0.16-2.el5_4.s390", "5Client-Workstation:xulrunner-0:1.9.0.16-2.el5_4.s390x", "5Client-Workstation:xulrunner-0:1.9.0.16-2.el5_4.src", "5Client-Workstation:xulrunner-0:1.9.0.16-2.el5_4.x86_64", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.i386", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ia64", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ppc", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ppc64", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.s390", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.s390x", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.x86_64", "5Client-Workstation:xulrunner-devel-0:1.9.0.16-2.el5_4.i386", "5Client-Workstation:xulrunner-devel-0:1.9.0.16-2.el5_4.ia64", "5Client-Workstation:xulrunner-devel-0:1.9.0.16-2.el5_4.ppc", "5Client-Workstation:xulrunner-devel-0:1.9.0.16-2.el5_4.ppc64", "5Client-Workstation:xulrunner-devel-0:1.9.0.16-2.el5_4.s390", "5Client-Workstation:xulrunner-devel-0:1.9.0.16-2.el5_4.s390x", "5Client-Workstation:xulrunner-devel-0:1.9.0.16-2.el5_4.x86_64", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.i386", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.ia64", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.ppc", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.s390x", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.x86_64", "5Client:firefox-0:3.0.16-1.el5_4.i386", "5Client:firefox-0:3.0.16-1.el5_4.ia64", "5Client:firefox-0:3.0.16-1.el5_4.ppc", "5Client:firefox-0:3.0.16-1.el5_4.s390", "5Client:firefox-0:3.0.16-1.el5_4.s390x", "5Client:firefox-0:3.0.16-1.el5_4.src", "5Client:firefox-0:3.0.16-1.el5_4.x86_64", "5Client:firefox-debuginfo-0:3.0.16-1.el5_4.i386", "5Client:firefox-debuginfo-0:3.0.16-1.el5_4.ia64", "5Client:firefox-debuginfo-0:3.0.16-1.el5_4.ppc", "5Client:firefox-debuginfo-0:3.0.16-1.el5_4.s390", "5Client:firefox-debuginfo-0:3.0.16-1.el5_4.s390x", "5Client:firefox-debuginfo-0:3.0.16-1.el5_4.x86_64", "5Client:xulrunner-0:1.9.0.16-2.el5_4.i386", "5Client:xulrunner-0:1.9.0.16-2.el5_4.ia64", "5Client:xulrunner-0:1.9.0.16-2.el5_4.ppc", "5Client:xulrunner-0:1.9.0.16-2.el5_4.ppc64", "5Client:xulrunner-0:1.9.0.16-2.el5_4.s390", "5Client:xulrunner-0:1.9.0.16-2.el5_4.s390x", "5Client:xulrunner-0:1.9.0.16-2.el5_4.src", "5Client:xulrunner-0:1.9.0.16-2.el5_4.x86_64", "5Client:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.i386", "5Client:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ia64", "5Client:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ppc", "5Client:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ppc64", "5Client:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.s390", "5Client:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.s390x", "5Client:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.x86_64", "5Client:xulrunner-devel-0:1.9.0.16-2.el5_4.i386", "5Client:xulrunner-devel-0:1.9.0.16-2.el5_4.ia64", "5Client:xulrunner-devel-0:1.9.0.16-2.el5_4.ppc", "5Client:xulrunner-devel-0:1.9.0.16-2.el5_4.ppc64", "5Client:xulrunner-devel-0:1.9.0.16-2.el5_4.s390", "5Client:xulrunner-devel-0:1.9.0.16-2.el5_4.s390x", "5Client:xulrunner-devel-0:1.9.0.16-2.el5_4.x86_64", "5Client:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.i386", "5Client:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.ia64", "5Client:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.ppc", "5Client:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.s390x", "5Client:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.x86_64", "5Server:firefox-0:3.0.16-1.el5_4.i386", "5Server:firefox-0:3.0.16-1.el5_4.ia64", "5Server:firefox-0:3.0.16-1.el5_4.ppc", "5Server:firefox-0:3.0.16-1.el5_4.s390", "5Server:firefox-0:3.0.16-1.el5_4.s390x", "5Server:firefox-0:3.0.16-1.el5_4.src", "5Server:firefox-0:3.0.16-1.el5_4.x86_64", "5Server:firefox-debuginfo-0:3.0.16-1.el5_4.i386", "5Server:firefox-debuginfo-0:3.0.16-1.el5_4.ia64", "5Server:firefox-debuginfo-0:3.0.16-1.el5_4.ppc", "5Server:firefox-debuginfo-0:3.0.16-1.el5_4.s390", "5Server:firefox-debuginfo-0:3.0.16-1.el5_4.s390x", "5Server:firefox-debuginfo-0:3.0.16-1.el5_4.x86_64", "5Server:xulrunner-0:1.9.0.16-2.el5_4.i386", "5Server:xulrunner-0:1.9.0.16-2.el5_4.ia64", "5Server:xulrunner-0:1.9.0.16-2.el5_4.ppc", "5Server:xulrunner-0:1.9.0.16-2.el5_4.ppc64", "5Server:xulrunner-0:1.9.0.16-2.el5_4.s390", "5Server:xulrunner-0:1.9.0.16-2.el5_4.s390x", "5Server:xulrunner-0:1.9.0.16-2.el5_4.src", "5Server:xulrunner-0:1.9.0.16-2.el5_4.x86_64", "5Server:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.i386", "5Server:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ia64", "5Server:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ppc", "5Server:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ppc64", "5Server:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.s390", "5Server:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.s390x", "5Server:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.x86_64", "5Server:xulrunner-devel-0:1.9.0.16-2.el5_4.i386", "5Server:xulrunner-devel-0:1.9.0.16-2.el5_4.ia64", "5Server:xulrunner-devel-0:1.9.0.16-2.el5_4.ppc", "5Server:xulrunner-devel-0:1.9.0.16-2.el5_4.ppc64", "5Server:xulrunner-devel-0:1.9.0.16-2.el5_4.s390", "5Server:xulrunner-devel-0:1.9.0.16-2.el5_4.s390x", "5Server:xulrunner-devel-0:1.9.0.16-2.el5_4.x86_64", "5Server:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.i386", "5Server:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.ia64", "5Server:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.ppc", "5Server:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.s390x", "5Server:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1674" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS:firefox-0:3.0.16-4.el4.i386", "4AS:firefox-0:3.0.16-4.el4.ia64", "4AS:firefox-0:3.0.16-4.el4.ppc", "4AS:firefox-0:3.0.16-4.el4.s390", "4AS:firefox-0:3.0.16-4.el4.s390x", "4AS:firefox-0:3.0.16-4.el4.src", "4AS:firefox-0:3.0.16-4.el4.x86_64", "4AS:firefox-debuginfo-0:3.0.16-4.el4.i386", "4AS:firefox-debuginfo-0:3.0.16-4.el4.ia64", "4AS:firefox-debuginfo-0:3.0.16-4.el4.ppc", "4AS:firefox-debuginfo-0:3.0.16-4.el4.s390", "4AS:firefox-debuginfo-0:3.0.16-4.el4.s390x", "4AS:firefox-debuginfo-0:3.0.16-4.el4.x86_64", "4Desktop:firefox-0:3.0.16-4.el4.i386", "4Desktop:firefox-0:3.0.16-4.el4.ia64", "4Desktop:firefox-0:3.0.16-4.el4.ppc", "4Desktop:firefox-0:3.0.16-4.el4.s390", "4Desktop:firefox-0:3.0.16-4.el4.s390x", "4Desktop:firefox-0:3.0.16-4.el4.src", "4Desktop:firefox-0:3.0.16-4.el4.x86_64", "4Desktop:firefox-debuginfo-0:3.0.16-4.el4.i386", "4Desktop:firefox-debuginfo-0:3.0.16-4.el4.ia64", "4Desktop:firefox-debuginfo-0:3.0.16-4.el4.ppc", "4Desktop:firefox-debuginfo-0:3.0.16-4.el4.s390", "4Desktop:firefox-debuginfo-0:3.0.16-4.el4.s390x", "4Desktop:firefox-debuginfo-0:3.0.16-4.el4.x86_64", "4ES:firefox-0:3.0.16-4.el4.i386", "4ES:firefox-0:3.0.16-4.el4.ia64", "4ES:firefox-0:3.0.16-4.el4.ppc", "4ES:firefox-0:3.0.16-4.el4.s390", "4ES:firefox-0:3.0.16-4.el4.s390x", "4ES:firefox-0:3.0.16-4.el4.src", "4ES:firefox-0:3.0.16-4.el4.x86_64", "4ES:firefox-debuginfo-0:3.0.16-4.el4.i386", "4ES:firefox-debuginfo-0:3.0.16-4.el4.ia64", "4ES:firefox-debuginfo-0:3.0.16-4.el4.ppc", "4ES:firefox-debuginfo-0:3.0.16-4.el4.s390", "4ES:firefox-debuginfo-0:3.0.16-4.el4.s390x", "4ES:firefox-debuginfo-0:3.0.16-4.el4.x86_64", "4WS:firefox-0:3.0.16-4.el4.i386", "4WS:firefox-0:3.0.16-4.el4.ia64", "4WS:firefox-0:3.0.16-4.el4.ppc", "4WS:firefox-0:3.0.16-4.el4.s390", "4WS:firefox-0:3.0.16-4.el4.s390x", "4WS:firefox-0:3.0.16-4.el4.src", "4WS:firefox-0:3.0.16-4.el4.x86_64", "4WS:firefox-debuginfo-0:3.0.16-4.el4.i386", "4WS:firefox-debuginfo-0:3.0.16-4.el4.ia64", "4WS:firefox-debuginfo-0:3.0.16-4.el4.ppc", "4WS:firefox-debuginfo-0:3.0.16-4.el4.s390", "4WS:firefox-debuginfo-0:3.0.16-4.el4.s390x", "4WS:firefox-debuginfo-0:3.0.16-4.el4.x86_64", "5Client-Workstation:xulrunner-0:1.9.0.16-2.el5_4.i386", "5Client-Workstation:xulrunner-0:1.9.0.16-2.el5_4.ia64", "5Client-Workstation:xulrunner-0:1.9.0.16-2.el5_4.ppc", "5Client-Workstation:xulrunner-0:1.9.0.16-2.el5_4.ppc64", "5Client-Workstation:xulrunner-0:1.9.0.16-2.el5_4.s390", "5Client-Workstation:xulrunner-0:1.9.0.16-2.el5_4.s390x", "5Client-Workstation:xulrunner-0:1.9.0.16-2.el5_4.src", "5Client-Workstation:xulrunner-0:1.9.0.16-2.el5_4.x86_64", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.i386", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ia64", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ppc", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ppc64", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.s390", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.s390x", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.x86_64", "5Client-Workstation:xulrunner-devel-0:1.9.0.16-2.el5_4.i386", "5Client-Workstation:xulrunner-devel-0:1.9.0.16-2.el5_4.ia64", "5Client-Workstation:xulrunner-devel-0:1.9.0.16-2.el5_4.ppc", "5Client-Workstation:xulrunner-devel-0:1.9.0.16-2.el5_4.ppc64", "5Client-Workstation:xulrunner-devel-0:1.9.0.16-2.el5_4.s390", "5Client-Workstation:xulrunner-devel-0:1.9.0.16-2.el5_4.s390x", "5Client-Workstation:xulrunner-devel-0:1.9.0.16-2.el5_4.x86_64", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.i386", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.ia64", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.ppc", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.s390x", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.x86_64", "5Client:firefox-0:3.0.16-1.el5_4.i386", "5Client:firefox-0:3.0.16-1.el5_4.ia64", "5Client:firefox-0:3.0.16-1.el5_4.ppc", "5Client:firefox-0:3.0.16-1.el5_4.s390", "5Client:firefox-0:3.0.16-1.el5_4.s390x", "5Client:firefox-0:3.0.16-1.el5_4.src", "5Client:firefox-0:3.0.16-1.el5_4.x86_64", "5Client:firefox-debuginfo-0:3.0.16-1.el5_4.i386", "5Client:firefox-debuginfo-0:3.0.16-1.el5_4.ia64", "5Client:firefox-debuginfo-0:3.0.16-1.el5_4.ppc", "5Client:firefox-debuginfo-0:3.0.16-1.el5_4.s390", "5Client:firefox-debuginfo-0:3.0.16-1.el5_4.s390x", "5Client:firefox-debuginfo-0:3.0.16-1.el5_4.x86_64", "5Client:xulrunner-0:1.9.0.16-2.el5_4.i386", "5Client:xulrunner-0:1.9.0.16-2.el5_4.ia64", "5Client:xulrunner-0:1.9.0.16-2.el5_4.ppc", "5Client:xulrunner-0:1.9.0.16-2.el5_4.ppc64", "5Client:xulrunner-0:1.9.0.16-2.el5_4.s390", "5Client:xulrunner-0:1.9.0.16-2.el5_4.s390x", "5Client:xulrunner-0:1.9.0.16-2.el5_4.src", "5Client:xulrunner-0:1.9.0.16-2.el5_4.x86_64", "5Client:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.i386", "5Client:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ia64", "5Client:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ppc", "5Client:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ppc64", "5Client:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.s390", "5Client:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.s390x", "5Client:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.x86_64", "5Client:xulrunner-devel-0:1.9.0.16-2.el5_4.i386", "5Client:xulrunner-devel-0:1.9.0.16-2.el5_4.ia64", "5Client:xulrunner-devel-0:1.9.0.16-2.el5_4.ppc", "5Client:xulrunner-devel-0:1.9.0.16-2.el5_4.ppc64", "5Client:xulrunner-devel-0:1.9.0.16-2.el5_4.s390", "5Client:xulrunner-devel-0:1.9.0.16-2.el5_4.s390x", "5Client:xulrunner-devel-0:1.9.0.16-2.el5_4.x86_64", "5Client:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.i386", "5Client:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.ia64", "5Client:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.ppc", "5Client:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.s390x", "5Client:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.x86_64", "5Server:firefox-0:3.0.16-1.el5_4.i386", "5Server:firefox-0:3.0.16-1.el5_4.ia64", "5Server:firefox-0:3.0.16-1.el5_4.ppc", "5Server:firefox-0:3.0.16-1.el5_4.s390", "5Server:firefox-0:3.0.16-1.el5_4.s390x", "5Server:firefox-0:3.0.16-1.el5_4.src", "5Server:firefox-0:3.0.16-1.el5_4.x86_64", "5Server:firefox-debuginfo-0:3.0.16-1.el5_4.i386", "5Server:firefox-debuginfo-0:3.0.16-1.el5_4.ia64", "5Server:firefox-debuginfo-0:3.0.16-1.el5_4.ppc", "5Server:firefox-debuginfo-0:3.0.16-1.el5_4.s390", "5Server:firefox-debuginfo-0:3.0.16-1.el5_4.s390x", "5Server:firefox-debuginfo-0:3.0.16-1.el5_4.x86_64", "5Server:xulrunner-0:1.9.0.16-2.el5_4.i386", "5Server:xulrunner-0:1.9.0.16-2.el5_4.ia64", "5Server:xulrunner-0:1.9.0.16-2.el5_4.ppc", "5Server:xulrunner-0:1.9.0.16-2.el5_4.ppc64", "5Server:xulrunner-0:1.9.0.16-2.el5_4.s390", "5Server:xulrunner-0:1.9.0.16-2.el5_4.s390x", "5Server:xulrunner-0:1.9.0.16-2.el5_4.src", "5Server:xulrunner-0:1.9.0.16-2.el5_4.x86_64", "5Server:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.i386", "5Server:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ia64", "5Server:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ppc", "5Server:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ppc64", "5Server:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.s390", "5Server:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.s390x", "5Server:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.x86_64", "5Server:xulrunner-devel-0:1.9.0.16-2.el5_4.i386", "5Server:xulrunner-devel-0:1.9.0.16-2.el5_4.ia64", "5Server:xulrunner-devel-0:1.9.0.16-2.el5_4.ppc", "5Server:xulrunner-devel-0:1.9.0.16-2.el5_4.ppc64", "5Server:xulrunner-devel-0:1.9.0.16-2.el5_4.s390", "5Server:xulrunner-devel-0:1.9.0.16-2.el5_4.s390x", "5Server:xulrunner-devel-0:1.9.0.16-2.el5_4.x86_64", "5Server:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.i386", "5Server:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.ia64", "5Server:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.ppc", "5Server:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.s390x", "5Server:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "Mozilla crashes with evidence of memory corruption" }, { "cve": "CVE-2009-3983", "discovery_date": "2009-12-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "546720" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox before 3.0.16 and 3.5.x before 3.5.6, and SeaMonkey before 2.0.1, allows remote attackers to send authenticated requests to arbitrary applications by replaying the NTLM credentials of a browser user.", "title": "Vulnerability description" }, { "category": "summary", "text": "Mozilla NTLM reflection vulnerability", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS:firefox-0:3.0.16-4.el4.i386", "4AS:firefox-0:3.0.16-4.el4.ia64", "4AS:firefox-0:3.0.16-4.el4.ppc", "4AS:firefox-0:3.0.16-4.el4.s390", "4AS:firefox-0:3.0.16-4.el4.s390x", "4AS:firefox-0:3.0.16-4.el4.src", "4AS:firefox-0:3.0.16-4.el4.x86_64", "4AS:firefox-debuginfo-0:3.0.16-4.el4.i386", "4AS:firefox-debuginfo-0:3.0.16-4.el4.ia64", "4AS:firefox-debuginfo-0:3.0.16-4.el4.ppc", "4AS:firefox-debuginfo-0:3.0.16-4.el4.s390", "4AS:firefox-debuginfo-0:3.0.16-4.el4.s390x", "4AS:firefox-debuginfo-0:3.0.16-4.el4.x86_64", "4Desktop:firefox-0:3.0.16-4.el4.i386", "4Desktop:firefox-0:3.0.16-4.el4.ia64", "4Desktop:firefox-0:3.0.16-4.el4.ppc", "4Desktop:firefox-0:3.0.16-4.el4.s390", "4Desktop:firefox-0:3.0.16-4.el4.s390x", "4Desktop:firefox-0:3.0.16-4.el4.src", "4Desktop:firefox-0:3.0.16-4.el4.x86_64", "4Desktop:firefox-debuginfo-0:3.0.16-4.el4.i386", "4Desktop:firefox-debuginfo-0:3.0.16-4.el4.ia64", "4Desktop:firefox-debuginfo-0:3.0.16-4.el4.ppc", "4Desktop:firefox-debuginfo-0:3.0.16-4.el4.s390", "4Desktop:firefox-debuginfo-0:3.0.16-4.el4.s390x", "4Desktop:firefox-debuginfo-0:3.0.16-4.el4.x86_64", "4ES:firefox-0:3.0.16-4.el4.i386", "4ES:firefox-0:3.0.16-4.el4.ia64", "4ES:firefox-0:3.0.16-4.el4.ppc", "4ES:firefox-0:3.0.16-4.el4.s390", "4ES:firefox-0:3.0.16-4.el4.s390x", "4ES:firefox-0:3.0.16-4.el4.src", "4ES:firefox-0:3.0.16-4.el4.x86_64", "4ES:firefox-debuginfo-0:3.0.16-4.el4.i386", "4ES:firefox-debuginfo-0:3.0.16-4.el4.ia64", "4ES:firefox-debuginfo-0:3.0.16-4.el4.ppc", "4ES:firefox-debuginfo-0:3.0.16-4.el4.s390", "4ES:firefox-debuginfo-0:3.0.16-4.el4.s390x", "4ES:firefox-debuginfo-0:3.0.16-4.el4.x86_64", "4WS:firefox-0:3.0.16-4.el4.i386", "4WS:firefox-0:3.0.16-4.el4.ia64", "4WS:firefox-0:3.0.16-4.el4.ppc", "4WS:firefox-0:3.0.16-4.el4.s390", "4WS:firefox-0:3.0.16-4.el4.s390x", "4WS:firefox-0:3.0.16-4.el4.src", "4WS:firefox-0:3.0.16-4.el4.x86_64", "4WS:firefox-debuginfo-0:3.0.16-4.el4.i386", "4WS:firefox-debuginfo-0:3.0.16-4.el4.ia64", "4WS:firefox-debuginfo-0:3.0.16-4.el4.ppc", "4WS:firefox-debuginfo-0:3.0.16-4.el4.s390", "4WS:firefox-debuginfo-0:3.0.16-4.el4.s390x", "4WS:firefox-debuginfo-0:3.0.16-4.el4.x86_64", "5Client-Workstation:xulrunner-0:1.9.0.16-2.el5_4.i386", "5Client-Workstation:xulrunner-0:1.9.0.16-2.el5_4.ia64", "5Client-Workstation:xulrunner-0:1.9.0.16-2.el5_4.ppc", "5Client-Workstation:xulrunner-0:1.9.0.16-2.el5_4.ppc64", "5Client-Workstation:xulrunner-0:1.9.0.16-2.el5_4.s390", "5Client-Workstation:xulrunner-0:1.9.0.16-2.el5_4.s390x", "5Client-Workstation:xulrunner-0:1.9.0.16-2.el5_4.src", "5Client-Workstation:xulrunner-0:1.9.0.16-2.el5_4.x86_64", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.i386", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ia64", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ppc", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ppc64", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.s390", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.s390x", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.x86_64", "5Client-Workstation:xulrunner-devel-0:1.9.0.16-2.el5_4.i386", "5Client-Workstation:xulrunner-devel-0:1.9.0.16-2.el5_4.ia64", "5Client-Workstation:xulrunner-devel-0:1.9.0.16-2.el5_4.ppc", "5Client-Workstation:xulrunner-devel-0:1.9.0.16-2.el5_4.ppc64", "5Client-Workstation:xulrunner-devel-0:1.9.0.16-2.el5_4.s390", "5Client-Workstation:xulrunner-devel-0:1.9.0.16-2.el5_4.s390x", "5Client-Workstation:xulrunner-devel-0:1.9.0.16-2.el5_4.x86_64", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.i386", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.ia64", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.ppc", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.s390x", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.x86_64", "5Client:firefox-0:3.0.16-1.el5_4.i386", "5Client:firefox-0:3.0.16-1.el5_4.ia64", "5Client:firefox-0:3.0.16-1.el5_4.ppc", "5Client:firefox-0:3.0.16-1.el5_4.s390", "5Client:firefox-0:3.0.16-1.el5_4.s390x", "5Client:firefox-0:3.0.16-1.el5_4.src", "5Client:firefox-0:3.0.16-1.el5_4.x86_64", "5Client:firefox-debuginfo-0:3.0.16-1.el5_4.i386", "5Client:firefox-debuginfo-0:3.0.16-1.el5_4.ia64", "5Client:firefox-debuginfo-0:3.0.16-1.el5_4.ppc", "5Client:firefox-debuginfo-0:3.0.16-1.el5_4.s390", "5Client:firefox-debuginfo-0:3.0.16-1.el5_4.s390x", "5Client:firefox-debuginfo-0:3.0.16-1.el5_4.x86_64", "5Client:xulrunner-0:1.9.0.16-2.el5_4.i386", "5Client:xulrunner-0:1.9.0.16-2.el5_4.ia64", "5Client:xulrunner-0:1.9.0.16-2.el5_4.ppc", "5Client:xulrunner-0:1.9.0.16-2.el5_4.ppc64", "5Client:xulrunner-0:1.9.0.16-2.el5_4.s390", "5Client:xulrunner-0:1.9.0.16-2.el5_4.s390x", "5Client:xulrunner-0:1.9.0.16-2.el5_4.src", "5Client:xulrunner-0:1.9.0.16-2.el5_4.x86_64", "5Client:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.i386", "5Client:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ia64", "5Client:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ppc", "5Client:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ppc64", "5Client:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.s390", "5Client:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.s390x", "5Client:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.x86_64", "5Client:xulrunner-devel-0:1.9.0.16-2.el5_4.i386", "5Client:xulrunner-devel-0:1.9.0.16-2.el5_4.ia64", "5Client:xulrunner-devel-0:1.9.0.16-2.el5_4.ppc", "5Client:xulrunner-devel-0:1.9.0.16-2.el5_4.ppc64", "5Client:xulrunner-devel-0:1.9.0.16-2.el5_4.s390", "5Client:xulrunner-devel-0:1.9.0.16-2.el5_4.s390x", "5Client:xulrunner-devel-0:1.9.0.16-2.el5_4.x86_64", "5Client:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.i386", "5Client:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.ia64", "5Client:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.ppc", "5Client:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.s390x", "5Client:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.x86_64", "5Server:firefox-0:3.0.16-1.el5_4.i386", "5Server:firefox-0:3.0.16-1.el5_4.ia64", "5Server:firefox-0:3.0.16-1.el5_4.ppc", "5Server:firefox-0:3.0.16-1.el5_4.s390", "5Server:firefox-0:3.0.16-1.el5_4.s390x", "5Server:firefox-0:3.0.16-1.el5_4.src", "5Server:firefox-0:3.0.16-1.el5_4.x86_64", "5Server:firefox-debuginfo-0:3.0.16-1.el5_4.i386", "5Server:firefox-debuginfo-0:3.0.16-1.el5_4.ia64", "5Server:firefox-debuginfo-0:3.0.16-1.el5_4.ppc", "5Server:firefox-debuginfo-0:3.0.16-1.el5_4.s390", "5Server:firefox-debuginfo-0:3.0.16-1.el5_4.s390x", "5Server:firefox-debuginfo-0:3.0.16-1.el5_4.x86_64", "5Server:xulrunner-0:1.9.0.16-2.el5_4.i386", "5Server:xulrunner-0:1.9.0.16-2.el5_4.ia64", "5Server:xulrunner-0:1.9.0.16-2.el5_4.ppc", "5Server:xulrunner-0:1.9.0.16-2.el5_4.ppc64", "5Server:xulrunner-0:1.9.0.16-2.el5_4.s390", "5Server:xulrunner-0:1.9.0.16-2.el5_4.s390x", "5Server:xulrunner-0:1.9.0.16-2.el5_4.src", "5Server:xulrunner-0:1.9.0.16-2.el5_4.x86_64", "5Server:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.i386", "5Server:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ia64", "5Server:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ppc", "5Server:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ppc64", "5Server:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.s390", "5Server:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.s390x", "5Server:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.x86_64", "5Server:xulrunner-devel-0:1.9.0.16-2.el5_4.i386", "5Server:xulrunner-devel-0:1.9.0.16-2.el5_4.ia64", "5Server:xulrunner-devel-0:1.9.0.16-2.el5_4.ppc", "5Server:xulrunner-devel-0:1.9.0.16-2.el5_4.ppc64", "5Server:xulrunner-devel-0:1.9.0.16-2.el5_4.s390", "5Server:xulrunner-devel-0:1.9.0.16-2.el5_4.s390x", "5Server:xulrunner-devel-0:1.9.0.16-2.el5_4.x86_64", "5Server:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.i386", "5Server:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.ia64", "5Server:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.ppc", "5Server:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.s390x", "5Server:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-3983" }, { "category": "external", "summary": "RHBZ#546720", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=546720" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3983", "url": "https://www.cve.org/CVERecord?id=CVE-2009-3983" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3983", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3983" } ], "release_date": "2009-12-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-12-16T04:56:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS:firefox-0:3.0.16-4.el4.i386", "4AS:firefox-0:3.0.16-4.el4.ia64", "4AS:firefox-0:3.0.16-4.el4.ppc", "4AS:firefox-0:3.0.16-4.el4.s390", "4AS:firefox-0:3.0.16-4.el4.s390x", "4AS:firefox-0:3.0.16-4.el4.src", "4AS:firefox-0:3.0.16-4.el4.x86_64", "4AS:firefox-debuginfo-0:3.0.16-4.el4.i386", "4AS:firefox-debuginfo-0:3.0.16-4.el4.ia64", "4AS:firefox-debuginfo-0:3.0.16-4.el4.ppc", "4AS:firefox-debuginfo-0:3.0.16-4.el4.s390", "4AS:firefox-debuginfo-0:3.0.16-4.el4.s390x", "4AS:firefox-debuginfo-0:3.0.16-4.el4.x86_64", "4Desktop:firefox-0:3.0.16-4.el4.i386", "4Desktop:firefox-0:3.0.16-4.el4.ia64", "4Desktop:firefox-0:3.0.16-4.el4.ppc", "4Desktop:firefox-0:3.0.16-4.el4.s390", "4Desktop:firefox-0:3.0.16-4.el4.s390x", "4Desktop:firefox-0:3.0.16-4.el4.src", "4Desktop:firefox-0:3.0.16-4.el4.x86_64", "4Desktop:firefox-debuginfo-0:3.0.16-4.el4.i386", "4Desktop:firefox-debuginfo-0:3.0.16-4.el4.ia64", "4Desktop:firefox-debuginfo-0:3.0.16-4.el4.ppc", "4Desktop:firefox-debuginfo-0:3.0.16-4.el4.s390", "4Desktop:firefox-debuginfo-0:3.0.16-4.el4.s390x", "4Desktop:firefox-debuginfo-0:3.0.16-4.el4.x86_64", "4ES:firefox-0:3.0.16-4.el4.i386", "4ES:firefox-0:3.0.16-4.el4.ia64", "4ES:firefox-0:3.0.16-4.el4.ppc", "4ES:firefox-0:3.0.16-4.el4.s390", "4ES:firefox-0:3.0.16-4.el4.s390x", "4ES:firefox-0:3.0.16-4.el4.src", "4ES:firefox-0:3.0.16-4.el4.x86_64", "4ES:firefox-debuginfo-0:3.0.16-4.el4.i386", "4ES:firefox-debuginfo-0:3.0.16-4.el4.ia64", "4ES:firefox-debuginfo-0:3.0.16-4.el4.ppc", "4ES:firefox-debuginfo-0:3.0.16-4.el4.s390", "4ES:firefox-debuginfo-0:3.0.16-4.el4.s390x", "4ES:firefox-debuginfo-0:3.0.16-4.el4.x86_64", "4WS:firefox-0:3.0.16-4.el4.i386", "4WS:firefox-0:3.0.16-4.el4.ia64", "4WS:firefox-0:3.0.16-4.el4.ppc", "4WS:firefox-0:3.0.16-4.el4.s390", "4WS:firefox-0:3.0.16-4.el4.s390x", "4WS:firefox-0:3.0.16-4.el4.src", "4WS:firefox-0:3.0.16-4.el4.x86_64", "4WS:firefox-debuginfo-0:3.0.16-4.el4.i386", "4WS:firefox-debuginfo-0:3.0.16-4.el4.ia64", "4WS:firefox-debuginfo-0:3.0.16-4.el4.ppc", "4WS:firefox-debuginfo-0:3.0.16-4.el4.s390", "4WS:firefox-debuginfo-0:3.0.16-4.el4.s390x", "4WS:firefox-debuginfo-0:3.0.16-4.el4.x86_64", "5Client-Workstation:xulrunner-0:1.9.0.16-2.el5_4.i386", "5Client-Workstation:xulrunner-0:1.9.0.16-2.el5_4.ia64", "5Client-Workstation:xulrunner-0:1.9.0.16-2.el5_4.ppc", "5Client-Workstation:xulrunner-0:1.9.0.16-2.el5_4.ppc64", "5Client-Workstation:xulrunner-0:1.9.0.16-2.el5_4.s390", "5Client-Workstation:xulrunner-0:1.9.0.16-2.el5_4.s390x", "5Client-Workstation:xulrunner-0:1.9.0.16-2.el5_4.src", "5Client-Workstation:xulrunner-0:1.9.0.16-2.el5_4.x86_64", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.i386", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ia64", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ppc", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ppc64", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.s390", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.s390x", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.x86_64", "5Client-Workstation:xulrunner-devel-0:1.9.0.16-2.el5_4.i386", "5Client-Workstation:xulrunner-devel-0:1.9.0.16-2.el5_4.ia64", "5Client-Workstation:xulrunner-devel-0:1.9.0.16-2.el5_4.ppc", "5Client-Workstation:xulrunner-devel-0:1.9.0.16-2.el5_4.ppc64", "5Client-Workstation:xulrunner-devel-0:1.9.0.16-2.el5_4.s390", "5Client-Workstation:xulrunner-devel-0:1.9.0.16-2.el5_4.s390x", "5Client-Workstation:xulrunner-devel-0:1.9.0.16-2.el5_4.x86_64", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.i386", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.ia64", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.ppc", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.s390x", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.x86_64", "5Client:firefox-0:3.0.16-1.el5_4.i386", "5Client:firefox-0:3.0.16-1.el5_4.ia64", "5Client:firefox-0:3.0.16-1.el5_4.ppc", "5Client:firefox-0:3.0.16-1.el5_4.s390", "5Client:firefox-0:3.0.16-1.el5_4.s390x", "5Client:firefox-0:3.0.16-1.el5_4.src", "5Client:firefox-0:3.0.16-1.el5_4.x86_64", "5Client:firefox-debuginfo-0:3.0.16-1.el5_4.i386", "5Client:firefox-debuginfo-0:3.0.16-1.el5_4.ia64", "5Client:firefox-debuginfo-0:3.0.16-1.el5_4.ppc", "5Client:firefox-debuginfo-0:3.0.16-1.el5_4.s390", "5Client:firefox-debuginfo-0:3.0.16-1.el5_4.s390x", "5Client:firefox-debuginfo-0:3.0.16-1.el5_4.x86_64", "5Client:xulrunner-0:1.9.0.16-2.el5_4.i386", "5Client:xulrunner-0:1.9.0.16-2.el5_4.ia64", "5Client:xulrunner-0:1.9.0.16-2.el5_4.ppc", "5Client:xulrunner-0:1.9.0.16-2.el5_4.ppc64", "5Client:xulrunner-0:1.9.0.16-2.el5_4.s390", "5Client:xulrunner-0:1.9.0.16-2.el5_4.s390x", "5Client:xulrunner-0:1.9.0.16-2.el5_4.src", "5Client:xulrunner-0:1.9.0.16-2.el5_4.x86_64", "5Client:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.i386", "5Client:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ia64", "5Client:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ppc", "5Client:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ppc64", "5Client:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.s390", "5Client:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.s390x", "5Client:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.x86_64", "5Client:xulrunner-devel-0:1.9.0.16-2.el5_4.i386", "5Client:xulrunner-devel-0:1.9.0.16-2.el5_4.ia64", "5Client:xulrunner-devel-0:1.9.0.16-2.el5_4.ppc", "5Client:xulrunner-devel-0:1.9.0.16-2.el5_4.ppc64", "5Client:xulrunner-devel-0:1.9.0.16-2.el5_4.s390", "5Client:xulrunner-devel-0:1.9.0.16-2.el5_4.s390x", "5Client:xulrunner-devel-0:1.9.0.16-2.el5_4.x86_64", "5Client:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.i386", "5Client:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.ia64", "5Client:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.ppc", "5Client:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.s390x", "5Client:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.x86_64", "5Server:firefox-0:3.0.16-1.el5_4.i386", "5Server:firefox-0:3.0.16-1.el5_4.ia64", "5Server:firefox-0:3.0.16-1.el5_4.ppc", "5Server:firefox-0:3.0.16-1.el5_4.s390", "5Server:firefox-0:3.0.16-1.el5_4.s390x", "5Server:firefox-0:3.0.16-1.el5_4.src", "5Server:firefox-0:3.0.16-1.el5_4.x86_64", "5Server:firefox-debuginfo-0:3.0.16-1.el5_4.i386", "5Server:firefox-debuginfo-0:3.0.16-1.el5_4.ia64", "5Server:firefox-debuginfo-0:3.0.16-1.el5_4.ppc", "5Server:firefox-debuginfo-0:3.0.16-1.el5_4.s390", "5Server:firefox-debuginfo-0:3.0.16-1.el5_4.s390x", "5Server:firefox-debuginfo-0:3.0.16-1.el5_4.x86_64", "5Server:xulrunner-0:1.9.0.16-2.el5_4.i386", "5Server:xulrunner-0:1.9.0.16-2.el5_4.ia64", "5Server:xulrunner-0:1.9.0.16-2.el5_4.ppc", "5Server:xulrunner-0:1.9.0.16-2.el5_4.ppc64", "5Server:xulrunner-0:1.9.0.16-2.el5_4.s390", "5Server:xulrunner-0:1.9.0.16-2.el5_4.s390x", "5Server:xulrunner-0:1.9.0.16-2.el5_4.src", "5Server:xulrunner-0:1.9.0.16-2.el5_4.x86_64", "5Server:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.i386", "5Server:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ia64", "5Server:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ppc", "5Server:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ppc64", "5Server:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.s390", "5Server:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.s390x", "5Server:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.x86_64", "5Server:xulrunner-devel-0:1.9.0.16-2.el5_4.i386", "5Server:xulrunner-devel-0:1.9.0.16-2.el5_4.ia64", "5Server:xulrunner-devel-0:1.9.0.16-2.el5_4.ppc", "5Server:xulrunner-devel-0:1.9.0.16-2.el5_4.ppc64", "5Server:xulrunner-devel-0:1.9.0.16-2.el5_4.s390", "5Server:xulrunner-devel-0:1.9.0.16-2.el5_4.s390x", "5Server:xulrunner-devel-0:1.9.0.16-2.el5_4.x86_64", "5Server:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.i386", "5Server:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.ia64", "5Server:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.ppc", "5Server:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.s390x", "5Server:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1674" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "4AS:firefox-0:3.0.16-4.el4.i386", "4AS:firefox-0:3.0.16-4.el4.ia64", "4AS:firefox-0:3.0.16-4.el4.ppc", "4AS:firefox-0:3.0.16-4.el4.s390", "4AS:firefox-0:3.0.16-4.el4.s390x", "4AS:firefox-0:3.0.16-4.el4.src", "4AS:firefox-0:3.0.16-4.el4.x86_64", "4AS:firefox-debuginfo-0:3.0.16-4.el4.i386", "4AS:firefox-debuginfo-0:3.0.16-4.el4.ia64", "4AS:firefox-debuginfo-0:3.0.16-4.el4.ppc", "4AS:firefox-debuginfo-0:3.0.16-4.el4.s390", "4AS:firefox-debuginfo-0:3.0.16-4.el4.s390x", "4AS:firefox-debuginfo-0:3.0.16-4.el4.x86_64", "4Desktop:firefox-0:3.0.16-4.el4.i386", "4Desktop:firefox-0:3.0.16-4.el4.ia64", "4Desktop:firefox-0:3.0.16-4.el4.ppc", "4Desktop:firefox-0:3.0.16-4.el4.s390", "4Desktop:firefox-0:3.0.16-4.el4.s390x", "4Desktop:firefox-0:3.0.16-4.el4.src", "4Desktop:firefox-0:3.0.16-4.el4.x86_64", "4Desktop:firefox-debuginfo-0:3.0.16-4.el4.i386", "4Desktop:firefox-debuginfo-0:3.0.16-4.el4.ia64", "4Desktop:firefox-debuginfo-0:3.0.16-4.el4.ppc", "4Desktop:firefox-debuginfo-0:3.0.16-4.el4.s390", "4Desktop:firefox-debuginfo-0:3.0.16-4.el4.s390x", "4Desktop:firefox-debuginfo-0:3.0.16-4.el4.x86_64", "4ES:firefox-0:3.0.16-4.el4.i386", "4ES:firefox-0:3.0.16-4.el4.ia64", "4ES:firefox-0:3.0.16-4.el4.ppc", "4ES:firefox-0:3.0.16-4.el4.s390", "4ES:firefox-0:3.0.16-4.el4.s390x", "4ES:firefox-0:3.0.16-4.el4.src", "4ES:firefox-0:3.0.16-4.el4.x86_64", "4ES:firefox-debuginfo-0:3.0.16-4.el4.i386", "4ES:firefox-debuginfo-0:3.0.16-4.el4.ia64", "4ES:firefox-debuginfo-0:3.0.16-4.el4.ppc", "4ES:firefox-debuginfo-0:3.0.16-4.el4.s390", "4ES:firefox-debuginfo-0:3.0.16-4.el4.s390x", "4ES:firefox-debuginfo-0:3.0.16-4.el4.x86_64", "4WS:firefox-0:3.0.16-4.el4.i386", "4WS:firefox-0:3.0.16-4.el4.ia64", "4WS:firefox-0:3.0.16-4.el4.ppc", "4WS:firefox-0:3.0.16-4.el4.s390", "4WS:firefox-0:3.0.16-4.el4.s390x", "4WS:firefox-0:3.0.16-4.el4.src", "4WS:firefox-0:3.0.16-4.el4.x86_64", "4WS:firefox-debuginfo-0:3.0.16-4.el4.i386", "4WS:firefox-debuginfo-0:3.0.16-4.el4.ia64", "4WS:firefox-debuginfo-0:3.0.16-4.el4.ppc", "4WS:firefox-debuginfo-0:3.0.16-4.el4.s390", "4WS:firefox-debuginfo-0:3.0.16-4.el4.s390x", "4WS:firefox-debuginfo-0:3.0.16-4.el4.x86_64", "5Client-Workstation:xulrunner-0:1.9.0.16-2.el5_4.i386", "5Client-Workstation:xulrunner-0:1.9.0.16-2.el5_4.ia64", "5Client-Workstation:xulrunner-0:1.9.0.16-2.el5_4.ppc", "5Client-Workstation:xulrunner-0:1.9.0.16-2.el5_4.ppc64", "5Client-Workstation:xulrunner-0:1.9.0.16-2.el5_4.s390", "5Client-Workstation:xulrunner-0:1.9.0.16-2.el5_4.s390x", "5Client-Workstation:xulrunner-0:1.9.0.16-2.el5_4.src", "5Client-Workstation:xulrunner-0:1.9.0.16-2.el5_4.x86_64", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.i386", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ia64", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ppc", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ppc64", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.s390", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.s390x", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.x86_64", "5Client-Workstation:xulrunner-devel-0:1.9.0.16-2.el5_4.i386", "5Client-Workstation:xulrunner-devel-0:1.9.0.16-2.el5_4.ia64", "5Client-Workstation:xulrunner-devel-0:1.9.0.16-2.el5_4.ppc", "5Client-Workstation:xulrunner-devel-0:1.9.0.16-2.el5_4.ppc64", "5Client-Workstation:xulrunner-devel-0:1.9.0.16-2.el5_4.s390", "5Client-Workstation:xulrunner-devel-0:1.9.0.16-2.el5_4.s390x", "5Client-Workstation:xulrunner-devel-0:1.9.0.16-2.el5_4.x86_64", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.i386", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.ia64", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.ppc", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.s390x", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.x86_64", "5Client:firefox-0:3.0.16-1.el5_4.i386", "5Client:firefox-0:3.0.16-1.el5_4.ia64", "5Client:firefox-0:3.0.16-1.el5_4.ppc", "5Client:firefox-0:3.0.16-1.el5_4.s390", "5Client:firefox-0:3.0.16-1.el5_4.s390x", "5Client:firefox-0:3.0.16-1.el5_4.src", "5Client:firefox-0:3.0.16-1.el5_4.x86_64", "5Client:firefox-debuginfo-0:3.0.16-1.el5_4.i386", "5Client:firefox-debuginfo-0:3.0.16-1.el5_4.ia64", "5Client:firefox-debuginfo-0:3.0.16-1.el5_4.ppc", "5Client:firefox-debuginfo-0:3.0.16-1.el5_4.s390", "5Client:firefox-debuginfo-0:3.0.16-1.el5_4.s390x", "5Client:firefox-debuginfo-0:3.0.16-1.el5_4.x86_64", "5Client:xulrunner-0:1.9.0.16-2.el5_4.i386", "5Client:xulrunner-0:1.9.0.16-2.el5_4.ia64", "5Client:xulrunner-0:1.9.0.16-2.el5_4.ppc", "5Client:xulrunner-0:1.9.0.16-2.el5_4.ppc64", "5Client:xulrunner-0:1.9.0.16-2.el5_4.s390", "5Client:xulrunner-0:1.9.0.16-2.el5_4.s390x", "5Client:xulrunner-0:1.9.0.16-2.el5_4.src", "5Client:xulrunner-0:1.9.0.16-2.el5_4.x86_64", "5Client:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.i386", "5Client:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ia64", "5Client:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ppc", "5Client:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ppc64", "5Client:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.s390", "5Client:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.s390x", "5Client:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.x86_64", "5Client:xulrunner-devel-0:1.9.0.16-2.el5_4.i386", "5Client:xulrunner-devel-0:1.9.0.16-2.el5_4.ia64", "5Client:xulrunner-devel-0:1.9.0.16-2.el5_4.ppc", "5Client:xulrunner-devel-0:1.9.0.16-2.el5_4.ppc64", "5Client:xulrunner-devel-0:1.9.0.16-2.el5_4.s390", "5Client:xulrunner-devel-0:1.9.0.16-2.el5_4.s390x", "5Client:xulrunner-devel-0:1.9.0.16-2.el5_4.x86_64", "5Client:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.i386", "5Client:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.ia64", "5Client:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.ppc", "5Client:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.s390x", "5Client:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.x86_64", "5Server:firefox-0:3.0.16-1.el5_4.i386", "5Server:firefox-0:3.0.16-1.el5_4.ia64", "5Server:firefox-0:3.0.16-1.el5_4.ppc", "5Server:firefox-0:3.0.16-1.el5_4.s390", "5Server:firefox-0:3.0.16-1.el5_4.s390x", "5Server:firefox-0:3.0.16-1.el5_4.src", "5Server:firefox-0:3.0.16-1.el5_4.x86_64", "5Server:firefox-debuginfo-0:3.0.16-1.el5_4.i386", "5Server:firefox-debuginfo-0:3.0.16-1.el5_4.ia64", "5Server:firefox-debuginfo-0:3.0.16-1.el5_4.ppc", "5Server:firefox-debuginfo-0:3.0.16-1.el5_4.s390", "5Server:firefox-debuginfo-0:3.0.16-1.el5_4.s390x", "5Server:firefox-debuginfo-0:3.0.16-1.el5_4.x86_64", "5Server:xulrunner-0:1.9.0.16-2.el5_4.i386", "5Server:xulrunner-0:1.9.0.16-2.el5_4.ia64", "5Server:xulrunner-0:1.9.0.16-2.el5_4.ppc", "5Server:xulrunner-0:1.9.0.16-2.el5_4.ppc64", "5Server:xulrunner-0:1.9.0.16-2.el5_4.s390", "5Server:xulrunner-0:1.9.0.16-2.el5_4.s390x", "5Server:xulrunner-0:1.9.0.16-2.el5_4.src", "5Server:xulrunner-0:1.9.0.16-2.el5_4.x86_64", "5Server:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.i386", "5Server:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ia64", "5Server:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ppc", "5Server:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ppc64", "5Server:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.s390", "5Server:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.s390x", "5Server:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.x86_64", "5Server:xulrunner-devel-0:1.9.0.16-2.el5_4.i386", "5Server:xulrunner-devel-0:1.9.0.16-2.el5_4.ia64", "5Server:xulrunner-devel-0:1.9.0.16-2.el5_4.ppc", "5Server:xulrunner-devel-0:1.9.0.16-2.el5_4.ppc64", "5Server:xulrunner-devel-0:1.9.0.16-2.el5_4.s390", "5Server:xulrunner-devel-0:1.9.0.16-2.el5_4.s390x", "5Server:xulrunner-devel-0:1.9.0.16-2.el5_4.x86_64", "5Server:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.i386", "5Server:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.ia64", "5Server:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.ppc", "5Server:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.s390x", "5Server:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Mozilla NTLM reflection vulnerability" }, { "cve": "CVE-2009-3984", "discovery_date": "2009-12-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "546722" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox before 3.0.16 and 3.5.x before 3.5.6, and SeaMonkey before 2.0.1, allows remote attackers to spoof an SSL indicator for an http URL or a file URL by setting document.location to an https URL corresponding to a site that responds with a No Content (aka 204) status code and an empty body.", "title": "Vulnerability description" }, { "category": "summary", "text": "Mozilla SSL spoofing with document.location and empty SSL response page", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS:firefox-0:3.0.16-4.el4.i386", "4AS:firefox-0:3.0.16-4.el4.ia64", "4AS:firefox-0:3.0.16-4.el4.ppc", "4AS:firefox-0:3.0.16-4.el4.s390", "4AS:firefox-0:3.0.16-4.el4.s390x", "4AS:firefox-0:3.0.16-4.el4.src", "4AS:firefox-0:3.0.16-4.el4.x86_64", "4AS:firefox-debuginfo-0:3.0.16-4.el4.i386", "4AS:firefox-debuginfo-0:3.0.16-4.el4.ia64", "4AS:firefox-debuginfo-0:3.0.16-4.el4.ppc", "4AS:firefox-debuginfo-0:3.0.16-4.el4.s390", "4AS:firefox-debuginfo-0:3.0.16-4.el4.s390x", "4AS:firefox-debuginfo-0:3.0.16-4.el4.x86_64", "4Desktop:firefox-0:3.0.16-4.el4.i386", "4Desktop:firefox-0:3.0.16-4.el4.ia64", "4Desktop:firefox-0:3.0.16-4.el4.ppc", "4Desktop:firefox-0:3.0.16-4.el4.s390", "4Desktop:firefox-0:3.0.16-4.el4.s390x", "4Desktop:firefox-0:3.0.16-4.el4.src", "4Desktop:firefox-0:3.0.16-4.el4.x86_64", "4Desktop:firefox-debuginfo-0:3.0.16-4.el4.i386", "4Desktop:firefox-debuginfo-0:3.0.16-4.el4.ia64", "4Desktop:firefox-debuginfo-0:3.0.16-4.el4.ppc", "4Desktop:firefox-debuginfo-0:3.0.16-4.el4.s390", "4Desktop:firefox-debuginfo-0:3.0.16-4.el4.s390x", "4Desktop:firefox-debuginfo-0:3.0.16-4.el4.x86_64", "4ES:firefox-0:3.0.16-4.el4.i386", "4ES:firefox-0:3.0.16-4.el4.ia64", "4ES:firefox-0:3.0.16-4.el4.ppc", "4ES:firefox-0:3.0.16-4.el4.s390", "4ES:firefox-0:3.0.16-4.el4.s390x", "4ES:firefox-0:3.0.16-4.el4.src", "4ES:firefox-0:3.0.16-4.el4.x86_64", "4ES:firefox-debuginfo-0:3.0.16-4.el4.i386", "4ES:firefox-debuginfo-0:3.0.16-4.el4.ia64", "4ES:firefox-debuginfo-0:3.0.16-4.el4.ppc", "4ES:firefox-debuginfo-0:3.0.16-4.el4.s390", "4ES:firefox-debuginfo-0:3.0.16-4.el4.s390x", "4ES:firefox-debuginfo-0:3.0.16-4.el4.x86_64", "4WS:firefox-0:3.0.16-4.el4.i386", "4WS:firefox-0:3.0.16-4.el4.ia64", "4WS:firefox-0:3.0.16-4.el4.ppc", "4WS:firefox-0:3.0.16-4.el4.s390", "4WS:firefox-0:3.0.16-4.el4.s390x", "4WS:firefox-0:3.0.16-4.el4.src", "4WS:firefox-0:3.0.16-4.el4.x86_64", "4WS:firefox-debuginfo-0:3.0.16-4.el4.i386", "4WS:firefox-debuginfo-0:3.0.16-4.el4.ia64", "4WS:firefox-debuginfo-0:3.0.16-4.el4.ppc", "4WS:firefox-debuginfo-0:3.0.16-4.el4.s390", "4WS:firefox-debuginfo-0:3.0.16-4.el4.s390x", "4WS:firefox-debuginfo-0:3.0.16-4.el4.x86_64", "5Client-Workstation:xulrunner-0:1.9.0.16-2.el5_4.i386", "5Client-Workstation:xulrunner-0:1.9.0.16-2.el5_4.ia64", "5Client-Workstation:xulrunner-0:1.9.0.16-2.el5_4.ppc", "5Client-Workstation:xulrunner-0:1.9.0.16-2.el5_4.ppc64", "5Client-Workstation:xulrunner-0:1.9.0.16-2.el5_4.s390", "5Client-Workstation:xulrunner-0:1.9.0.16-2.el5_4.s390x", "5Client-Workstation:xulrunner-0:1.9.0.16-2.el5_4.src", "5Client-Workstation:xulrunner-0:1.9.0.16-2.el5_4.x86_64", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.i386", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ia64", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ppc", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ppc64", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.s390", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.s390x", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.x86_64", "5Client-Workstation:xulrunner-devel-0:1.9.0.16-2.el5_4.i386", "5Client-Workstation:xulrunner-devel-0:1.9.0.16-2.el5_4.ia64", "5Client-Workstation:xulrunner-devel-0:1.9.0.16-2.el5_4.ppc", "5Client-Workstation:xulrunner-devel-0:1.9.0.16-2.el5_4.ppc64", "5Client-Workstation:xulrunner-devel-0:1.9.0.16-2.el5_4.s390", "5Client-Workstation:xulrunner-devel-0:1.9.0.16-2.el5_4.s390x", "5Client-Workstation:xulrunner-devel-0:1.9.0.16-2.el5_4.x86_64", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.i386", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.ia64", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.ppc", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.s390x", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.x86_64", "5Client:firefox-0:3.0.16-1.el5_4.i386", "5Client:firefox-0:3.0.16-1.el5_4.ia64", "5Client:firefox-0:3.0.16-1.el5_4.ppc", "5Client:firefox-0:3.0.16-1.el5_4.s390", "5Client:firefox-0:3.0.16-1.el5_4.s390x", "5Client:firefox-0:3.0.16-1.el5_4.src", "5Client:firefox-0:3.0.16-1.el5_4.x86_64", "5Client:firefox-debuginfo-0:3.0.16-1.el5_4.i386", "5Client:firefox-debuginfo-0:3.0.16-1.el5_4.ia64", "5Client:firefox-debuginfo-0:3.0.16-1.el5_4.ppc", "5Client:firefox-debuginfo-0:3.0.16-1.el5_4.s390", "5Client:firefox-debuginfo-0:3.0.16-1.el5_4.s390x", "5Client:firefox-debuginfo-0:3.0.16-1.el5_4.x86_64", "5Client:xulrunner-0:1.9.0.16-2.el5_4.i386", "5Client:xulrunner-0:1.9.0.16-2.el5_4.ia64", "5Client:xulrunner-0:1.9.0.16-2.el5_4.ppc", "5Client:xulrunner-0:1.9.0.16-2.el5_4.ppc64", "5Client:xulrunner-0:1.9.0.16-2.el5_4.s390", "5Client:xulrunner-0:1.9.0.16-2.el5_4.s390x", "5Client:xulrunner-0:1.9.0.16-2.el5_4.src", "5Client:xulrunner-0:1.9.0.16-2.el5_4.x86_64", "5Client:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.i386", "5Client:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ia64", "5Client:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ppc", "5Client:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ppc64", "5Client:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.s390", "5Client:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.s390x", "5Client:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.x86_64", "5Client:xulrunner-devel-0:1.9.0.16-2.el5_4.i386", "5Client:xulrunner-devel-0:1.9.0.16-2.el5_4.ia64", "5Client:xulrunner-devel-0:1.9.0.16-2.el5_4.ppc", "5Client:xulrunner-devel-0:1.9.0.16-2.el5_4.ppc64", "5Client:xulrunner-devel-0:1.9.0.16-2.el5_4.s390", "5Client:xulrunner-devel-0:1.9.0.16-2.el5_4.s390x", "5Client:xulrunner-devel-0:1.9.0.16-2.el5_4.x86_64", "5Client:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.i386", "5Client:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.ia64", "5Client:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.ppc", "5Client:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.s390x", "5Client:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.x86_64", "5Server:firefox-0:3.0.16-1.el5_4.i386", "5Server:firefox-0:3.0.16-1.el5_4.ia64", "5Server:firefox-0:3.0.16-1.el5_4.ppc", "5Server:firefox-0:3.0.16-1.el5_4.s390", "5Server:firefox-0:3.0.16-1.el5_4.s390x", "5Server:firefox-0:3.0.16-1.el5_4.src", "5Server:firefox-0:3.0.16-1.el5_4.x86_64", "5Server:firefox-debuginfo-0:3.0.16-1.el5_4.i386", "5Server:firefox-debuginfo-0:3.0.16-1.el5_4.ia64", "5Server:firefox-debuginfo-0:3.0.16-1.el5_4.ppc", "5Server:firefox-debuginfo-0:3.0.16-1.el5_4.s390", "5Server:firefox-debuginfo-0:3.0.16-1.el5_4.s390x", "5Server:firefox-debuginfo-0:3.0.16-1.el5_4.x86_64", "5Server:xulrunner-0:1.9.0.16-2.el5_4.i386", "5Server:xulrunner-0:1.9.0.16-2.el5_4.ia64", "5Server:xulrunner-0:1.9.0.16-2.el5_4.ppc", "5Server:xulrunner-0:1.9.0.16-2.el5_4.ppc64", "5Server:xulrunner-0:1.9.0.16-2.el5_4.s390", "5Server:xulrunner-0:1.9.0.16-2.el5_4.s390x", "5Server:xulrunner-0:1.9.0.16-2.el5_4.src", "5Server:xulrunner-0:1.9.0.16-2.el5_4.x86_64", "5Server:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.i386", "5Server:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ia64", "5Server:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ppc", "5Server:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ppc64", "5Server:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.s390", "5Server:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.s390x", "5Server:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.x86_64", "5Server:xulrunner-devel-0:1.9.0.16-2.el5_4.i386", "5Server:xulrunner-devel-0:1.9.0.16-2.el5_4.ia64", "5Server:xulrunner-devel-0:1.9.0.16-2.el5_4.ppc", "5Server:xulrunner-devel-0:1.9.0.16-2.el5_4.ppc64", "5Server:xulrunner-devel-0:1.9.0.16-2.el5_4.s390", "5Server:xulrunner-devel-0:1.9.0.16-2.el5_4.s390x", "5Server:xulrunner-devel-0:1.9.0.16-2.el5_4.x86_64", "5Server:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.i386", "5Server:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.ia64", "5Server:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.ppc", "5Server:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.s390x", "5Server:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-3984" }, { "category": "external", "summary": "RHBZ#546722", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=546722" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3984", "url": "https://www.cve.org/CVERecord?id=CVE-2009-3984" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3984", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3984" } ], "release_date": "2009-12-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-12-16T04:56:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS:firefox-0:3.0.16-4.el4.i386", "4AS:firefox-0:3.0.16-4.el4.ia64", "4AS:firefox-0:3.0.16-4.el4.ppc", "4AS:firefox-0:3.0.16-4.el4.s390", "4AS:firefox-0:3.0.16-4.el4.s390x", "4AS:firefox-0:3.0.16-4.el4.src", "4AS:firefox-0:3.0.16-4.el4.x86_64", "4AS:firefox-debuginfo-0:3.0.16-4.el4.i386", "4AS:firefox-debuginfo-0:3.0.16-4.el4.ia64", "4AS:firefox-debuginfo-0:3.0.16-4.el4.ppc", "4AS:firefox-debuginfo-0:3.0.16-4.el4.s390", "4AS:firefox-debuginfo-0:3.0.16-4.el4.s390x", "4AS:firefox-debuginfo-0:3.0.16-4.el4.x86_64", "4Desktop:firefox-0:3.0.16-4.el4.i386", "4Desktop:firefox-0:3.0.16-4.el4.ia64", "4Desktop:firefox-0:3.0.16-4.el4.ppc", "4Desktop:firefox-0:3.0.16-4.el4.s390", "4Desktop:firefox-0:3.0.16-4.el4.s390x", "4Desktop:firefox-0:3.0.16-4.el4.src", "4Desktop:firefox-0:3.0.16-4.el4.x86_64", "4Desktop:firefox-debuginfo-0:3.0.16-4.el4.i386", "4Desktop:firefox-debuginfo-0:3.0.16-4.el4.ia64", "4Desktop:firefox-debuginfo-0:3.0.16-4.el4.ppc", "4Desktop:firefox-debuginfo-0:3.0.16-4.el4.s390", "4Desktop:firefox-debuginfo-0:3.0.16-4.el4.s390x", "4Desktop:firefox-debuginfo-0:3.0.16-4.el4.x86_64", "4ES:firefox-0:3.0.16-4.el4.i386", "4ES:firefox-0:3.0.16-4.el4.ia64", "4ES:firefox-0:3.0.16-4.el4.ppc", "4ES:firefox-0:3.0.16-4.el4.s390", "4ES:firefox-0:3.0.16-4.el4.s390x", "4ES:firefox-0:3.0.16-4.el4.src", "4ES:firefox-0:3.0.16-4.el4.x86_64", "4ES:firefox-debuginfo-0:3.0.16-4.el4.i386", "4ES:firefox-debuginfo-0:3.0.16-4.el4.ia64", "4ES:firefox-debuginfo-0:3.0.16-4.el4.ppc", "4ES:firefox-debuginfo-0:3.0.16-4.el4.s390", "4ES:firefox-debuginfo-0:3.0.16-4.el4.s390x", "4ES:firefox-debuginfo-0:3.0.16-4.el4.x86_64", "4WS:firefox-0:3.0.16-4.el4.i386", "4WS:firefox-0:3.0.16-4.el4.ia64", "4WS:firefox-0:3.0.16-4.el4.ppc", "4WS:firefox-0:3.0.16-4.el4.s390", "4WS:firefox-0:3.0.16-4.el4.s390x", "4WS:firefox-0:3.0.16-4.el4.src", "4WS:firefox-0:3.0.16-4.el4.x86_64", "4WS:firefox-debuginfo-0:3.0.16-4.el4.i386", "4WS:firefox-debuginfo-0:3.0.16-4.el4.ia64", "4WS:firefox-debuginfo-0:3.0.16-4.el4.ppc", "4WS:firefox-debuginfo-0:3.0.16-4.el4.s390", "4WS:firefox-debuginfo-0:3.0.16-4.el4.s390x", "4WS:firefox-debuginfo-0:3.0.16-4.el4.x86_64", "5Client-Workstation:xulrunner-0:1.9.0.16-2.el5_4.i386", "5Client-Workstation:xulrunner-0:1.9.0.16-2.el5_4.ia64", "5Client-Workstation:xulrunner-0:1.9.0.16-2.el5_4.ppc", "5Client-Workstation:xulrunner-0:1.9.0.16-2.el5_4.ppc64", "5Client-Workstation:xulrunner-0:1.9.0.16-2.el5_4.s390", "5Client-Workstation:xulrunner-0:1.9.0.16-2.el5_4.s390x", "5Client-Workstation:xulrunner-0:1.9.0.16-2.el5_4.src", "5Client-Workstation:xulrunner-0:1.9.0.16-2.el5_4.x86_64", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.i386", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ia64", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ppc", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ppc64", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.s390", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.s390x", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.x86_64", "5Client-Workstation:xulrunner-devel-0:1.9.0.16-2.el5_4.i386", "5Client-Workstation:xulrunner-devel-0:1.9.0.16-2.el5_4.ia64", "5Client-Workstation:xulrunner-devel-0:1.9.0.16-2.el5_4.ppc", "5Client-Workstation:xulrunner-devel-0:1.9.0.16-2.el5_4.ppc64", "5Client-Workstation:xulrunner-devel-0:1.9.0.16-2.el5_4.s390", "5Client-Workstation:xulrunner-devel-0:1.9.0.16-2.el5_4.s390x", "5Client-Workstation:xulrunner-devel-0:1.9.0.16-2.el5_4.x86_64", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.i386", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.ia64", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.ppc", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.s390x", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.x86_64", "5Client:firefox-0:3.0.16-1.el5_4.i386", "5Client:firefox-0:3.0.16-1.el5_4.ia64", "5Client:firefox-0:3.0.16-1.el5_4.ppc", "5Client:firefox-0:3.0.16-1.el5_4.s390", "5Client:firefox-0:3.0.16-1.el5_4.s390x", "5Client:firefox-0:3.0.16-1.el5_4.src", "5Client:firefox-0:3.0.16-1.el5_4.x86_64", "5Client:firefox-debuginfo-0:3.0.16-1.el5_4.i386", "5Client:firefox-debuginfo-0:3.0.16-1.el5_4.ia64", "5Client:firefox-debuginfo-0:3.0.16-1.el5_4.ppc", "5Client:firefox-debuginfo-0:3.0.16-1.el5_4.s390", "5Client:firefox-debuginfo-0:3.0.16-1.el5_4.s390x", "5Client:firefox-debuginfo-0:3.0.16-1.el5_4.x86_64", "5Client:xulrunner-0:1.9.0.16-2.el5_4.i386", "5Client:xulrunner-0:1.9.0.16-2.el5_4.ia64", "5Client:xulrunner-0:1.9.0.16-2.el5_4.ppc", "5Client:xulrunner-0:1.9.0.16-2.el5_4.ppc64", "5Client:xulrunner-0:1.9.0.16-2.el5_4.s390", "5Client:xulrunner-0:1.9.0.16-2.el5_4.s390x", "5Client:xulrunner-0:1.9.0.16-2.el5_4.src", "5Client:xulrunner-0:1.9.0.16-2.el5_4.x86_64", "5Client:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.i386", "5Client:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ia64", "5Client:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ppc", "5Client:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ppc64", "5Client:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.s390", "5Client:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.s390x", "5Client:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.x86_64", "5Client:xulrunner-devel-0:1.9.0.16-2.el5_4.i386", "5Client:xulrunner-devel-0:1.9.0.16-2.el5_4.ia64", "5Client:xulrunner-devel-0:1.9.0.16-2.el5_4.ppc", "5Client:xulrunner-devel-0:1.9.0.16-2.el5_4.ppc64", "5Client:xulrunner-devel-0:1.9.0.16-2.el5_4.s390", "5Client:xulrunner-devel-0:1.9.0.16-2.el5_4.s390x", "5Client:xulrunner-devel-0:1.9.0.16-2.el5_4.x86_64", "5Client:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.i386", "5Client:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.ia64", "5Client:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.ppc", "5Client:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.s390x", "5Client:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.x86_64", "5Server:firefox-0:3.0.16-1.el5_4.i386", "5Server:firefox-0:3.0.16-1.el5_4.ia64", "5Server:firefox-0:3.0.16-1.el5_4.ppc", "5Server:firefox-0:3.0.16-1.el5_4.s390", "5Server:firefox-0:3.0.16-1.el5_4.s390x", "5Server:firefox-0:3.0.16-1.el5_4.src", "5Server:firefox-0:3.0.16-1.el5_4.x86_64", "5Server:firefox-debuginfo-0:3.0.16-1.el5_4.i386", "5Server:firefox-debuginfo-0:3.0.16-1.el5_4.ia64", "5Server:firefox-debuginfo-0:3.0.16-1.el5_4.ppc", "5Server:firefox-debuginfo-0:3.0.16-1.el5_4.s390", "5Server:firefox-debuginfo-0:3.0.16-1.el5_4.s390x", "5Server:firefox-debuginfo-0:3.0.16-1.el5_4.x86_64", "5Server:xulrunner-0:1.9.0.16-2.el5_4.i386", "5Server:xulrunner-0:1.9.0.16-2.el5_4.ia64", "5Server:xulrunner-0:1.9.0.16-2.el5_4.ppc", "5Server:xulrunner-0:1.9.0.16-2.el5_4.ppc64", "5Server:xulrunner-0:1.9.0.16-2.el5_4.s390", "5Server:xulrunner-0:1.9.0.16-2.el5_4.s390x", "5Server:xulrunner-0:1.9.0.16-2.el5_4.src", "5Server:xulrunner-0:1.9.0.16-2.el5_4.x86_64", "5Server:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.i386", "5Server:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ia64", "5Server:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ppc", "5Server:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ppc64", "5Server:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.s390", "5Server:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.s390x", "5Server:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.x86_64", "5Server:xulrunner-devel-0:1.9.0.16-2.el5_4.i386", "5Server:xulrunner-devel-0:1.9.0.16-2.el5_4.ia64", "5Server:xulrunner-devel-0:1.9.0.16-2.el5_4.ppc", "5Server:xulrunner-devel-0:1.9.0.16-2.el5_4.ppc64", "5Server:xulrunner-devel-0:1.9.0.16-2.el5_4.s390", "5Server:xulrunner-devel-0:1.9.0.16-2.el5_4.s390x", "5Server:xulrunner-devel-0:1.9.0.16-2.el5_4.x86_64", "5Server:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.i386", "5Server:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.ia64", "5Server:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.ppc", "5Server:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.s390x", "5Server:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1674" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "4AS:firefox-0:3.0.16-4.el4.i386", "4AS:firefox-0:3.0.16-4.el4.ia64", "4AS:firefox-0:3.0.16-4.el4.ppc", "4AS:firefox-0:3.0.16-4.el4.s390", "4AS:firefox-0:3.0.16-4.el4.s390x", "4AS:firefox-0:3.0.16-4.el4.src", "4AS:firefox-0:3.0.16-4.el4.x86_64", "4AS:firefox-debuginfo-0:3.0.16-4.el4.i386", "4AS:firefox-debuginfo-0:3.0.16-4.el4.ia64", "4AS:firefox-debuginfo-0:3.0.16-4.el4.ppc", "4AS:firefox-debuginfo-0:3.0.16-4.el4.s390", "4AS:firefox-debuginfo-0:3.0.16-4.el4.s390x", "4AS:firefox-debuginfo-0:3.0.16-4.el4.x86_64", "4Desktop:firefox-0:3.0.16-4.el4.i386", "4Desktop:firefox-0:3.0.16-4.el4.ia64", "4Desktop:firefox-0:3.0.16-4.el4.ppc", "4Desktop:firefox-0:3.0.16-4.el4.s390", "4Desktop:firefox-0:3.0.16-4.el4.s390x", "4Desktop:firefox-0:3.0.16-4.el4.src", "4Desktop:firefox-0:3.0.16-4.el4.x86_64", "4Desktop:firefox-debuginfo-0:3.0.16-4.el4.i386", "4Desktop:firefox-debuginfo-0:3.0.16-4.el4.ia64", "4Desktop:firefox-debuginfo-0:3.0.16-4.el4.ppc", "4Desktop:firefox-debuginfo-0:3.0.16-4.el4.s390", "4Desktop:firefox-debuginfo-0:3.0.16-4.el4.s390x", "4Desktop:firefox-debuginfo-0:3.0.16-4.el4.x86_64", "4ES:firefox-0:3.0.16-4.el4.i386", "4ES:firefox-0:3.0.16-4.el4.ia64", "4ES:firefox-0:3.0.16-4.el4.ppc", "4ES:firefox-0:3.0.16-4.el4.s390", "4ES:firefox-0:3.0.16-4.el4.s390x", "4ES:firefox-0:3.0.16-4.el4.src", "4ES:firefox-0:3.0.16-4.el4.x86_64", "4ES:firefox-debuginfo-0:3.0.16-4.el4.i386", "4ES:firefox-debuginfo-0:3.0.16-4.el4.ia64", "4ES:firefox-debuginfo-0:3.0.16-4.el4.ppc", "4ES:firefox-debuginfo-0:3.0.16-4.el4.s390", "4ES:firefox-debuginfo-0:3.0.16-4.el4.s390x", "4ES:firefox-debuginfo-0:3.0.16-4.el4.x86_64", "4WS:firefox-0:3.0.16-4.el4.i386", "4WS:firefox-0:3.0.16-4.el4.ia64", "4WS:firefox-0:3.0.16-4.el4.ppc", "4WS:firefox-0:3.0.16-4.el4.s390", "4WS:firefox-0:3.0.16-4.el4.s390x", "4WS:firefox-0:3.0.16-4.el4.src", "4WS:firefox-0:3.0.16-4.el4.x86_64", "4WS:firefox-debuginfo-0:3.0.16-4.el4.i386", "4WS:firefox-debuginfo-0:3.0.16-4.el4.ia64", "4WS:firefox-debuginfo-0:3.0.16-4.el4.ppc", "4WS:firefox-debuginfo-0:3.0.16-4.el4.s390", "4WS:firefox-debuginfo-0:3.0.16-4.el4.s390x", "4WS:firefox-debuginfo-0:3.0.16-4.el4.x86_64", "5Client-Workstation:xulrunner-0:1.9.0.16-2.el5_4.i386", "5Client-Workstation:xulrunner-0:1.9.0.16-2.el5_4.ia64", "5Client-Workstation:xulrunner-0:1.9.0.16-2.el5_4.ppc", "5Client-Workstation:xulrunner-0:1.9.0.16-2.el5_4.ppc64", "5Client-Workstation:xulrunner-0:1.9.0.16-2.el5_4.s390", "5Client-Workstation:xulrunner-0:1.9.0.16-2.el5_4.s390x", "5Client-Workstation:xulrunner-0:1.9.0.16-2.el5_4.src", "5Client-Workstation:xulrunner-0:1.9.0.16-2.el5_4.x86_64", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.i386", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ia64", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ppc", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ppc64", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.s390", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.s390x", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.x86_64", "5Client-Workstation:xulrunner-devel-0:1.9.0.16-2.el5_4.i386", "5Client-Workstation:xulrunner-devel-0:1.9.0.16-2.el5_4.ia64", "5Client-Workstation:xulrunner-devel-0:1.9.0.16-2.el5_4.ppc", "5Client-Workstation:xulrunner-devel-0:1.9.0.16-2.el5_4.ppc64", "5Client-Workstation:xulrunner-devel-0:1.9.0.16-2.el5_4.s390", "5Client-Workstation:xulrunner-devel-0:1.9.0.16-2.el5_4.s390x", "5Client-Workstation:xulrunner-devel-0:1.9.0.16-2.el5_4.x86_64", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.i386", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.ia64", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.ppc", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.s390x", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.x86_64", "5Client:firefox-0:3.0.16-1.el5_4.i386", "5Client:firefox-0:3.0.16-1.el5_4.ia64", "5Client:firefox-0:3.0.16-1.el5_4.ppc", "5Client:firefox-0:3.0.16-1.el5_4.s390", "5Client:firefox-0:3.0.16-1.el5_4.s390x", "5Client:firefox-0:3.0.16-1.el5_4.src", "5Client:firefox-0:3.0.16-1.el5_4.x86_64", "5Client:firefox-debuginfo-0:3.0.16-1.el5_4.i386", "5Client:firefox-debuginfo-0:3.0.16-1.el5_4.ia64", "5Client:firefox-debuginfo-0:3.0.16-1.el5_4.ppc", "5Client:firefox-debuginfo-0:3.0.16-1.el5_4.s390", "5Client:firefox-debuginfo-0:3.0.16-1.el5_4.s390x", "5Client:firefox-debuginfo-0:3.0.16-1.el5_4.x86_64", "5Client:xulrunner-0:1.9.0.16-2.el5_4.i386", "5Client:xulrunner-0:1.9.0.16-2.el5_4.ia64", "5Client:xulrunner-0:1.9.0.16-2.el5_4.ppc", "5Client:xulrunner-0:1.9.0.16-2.el5_4.ppc64", "5Client:xulrunner-0:1.9.0.16-2.el5_4.s390", "5Client:xulrunner-0:1.9.0.16-2.el5_4.s390x", "5Client:xulrunner-0:1.9.0.16-2.el5_4.src", "5Client:xulrunner-0:1.9.0.16-2.el5_4.x86_64", "5Client:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.i386", "5Client:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ia64", "5Client:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ppc", "5Client:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ppc64", "5Client:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.s390", "5Client:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.s390x", "5Client:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.x86_64", "5Client:xulrunner-devel-0:1.9.0.16-2.el5_4.i386", "5Client:xulrunner-devel-0:1.9.0.16-2.el5_4.ia64", "5Client:xulrunner-devel-0:1.9.0.16-2.el5_4.ppc", "5Client:xulrunner-devel-0:1.9.0.16-2.el5_4.ppc64", "5Client:xulrunner-devel-0:1.9.0.16-2.el5_4.s390", "5Client:xulrunner-devel-0:1.9.0.16-2.el5_4.s390x", "5Client:xulrunner-devel-0:1.9.0.16-2.el5_4.x86_64", "5Client:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.i386", "5Client:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.ia64", "5Client:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.ppc", "5Client:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.s390x", "5Client:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.x86_64", "5Server:firefox-0:3.0.16-1.el5_4.i386", "5Server:firefox-0:3.0.16-1.el5_4.ia64", "5Server:firefox-0:3.0.16-1.el5_4.ppc", "5Server:firefox-0:3.0.16-1.el5_4.s390", "5Server:firefox-0:3.0.16-1.el5_4.s390x", "5Server:firefox-0:3.0.16-1.el5_4.src", "5Server:firefox-0:3.0.16-1.el5_4.x86_64", "5Server:firefox-debuginfo-0:3.0.16-1.el5_4.i386", "5Server:firefox-debuginfo-0:3.0.16-1.el5_4.ia64", "5Server:firefox-debuginfo-0:3.0.16-1.el5_4.ppc", "5Server:firefox-debuginfo-0:3.0.16-1.el5_4.s390", "5Server:firefox-debuginfo-0:3.0.16-1.el5_4.s390x", "5Server:firefox-debuginfo-0:3.0.16-1.el5_4.x86_64", "5Server:xulrunner-0:1.9.0.16-2.el5_4.i386", "5Server:xulrunner-0:1.9.0.16-2.el5_4.ia64", "5Server:xulrunner-0:1.9.0.16-2.el5_4.ppc", "5Server:xulrunner-0:1.9.0.16-2.el5_4.ppc64", "5Server:xulrunner-0:1.9.0.16-2.el5_4.s390", "5Server:xulrunner-0:1.9.0.16-2.el5_4.s390x", "5Server:xulrunner-0:1.9.0.16-2.el5_4.src", "5Server:xulrunner-0:1.9.0.16-2.el5_4.x86_64", "5Server:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.i386", "5Server:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ia64", "5Server:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ppc", "5Server:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ppc64", "5Server:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.s390", "5Server:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.s390x", "5Server:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.x86_64", "5Server:xulrunner-devel-0:1.9.0.16-2.el5_4.i386", "5Server:xulrunner-devel-0:1.9.0.16-2.el5_4.ia64", "5Server:xulrunner-devel-0:1.9.0.16-2.el5_4.ppc", "5Server:xulrunner-devel-0:1.9.0.16-2.el5_4.ppc64", "5Server:xulrunner-devel-0:1.9.0.16-2.el5_4.s390", "5Server:xulrunner-devel-0:1.9.0.16-2.el5_4.s390x", "5Server:xulrunner-devel-0:1.9.0.16-2.el5_4.x86_64", "5Server:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.i386", "5Server:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.ia64", "5Server:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.ppc", "5Server:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.s390x", "5Server:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Mozilla SSL spoofing with document.location and empty SSL response page" }, { "cve": "CVE-2009-3985", "discovery_date": "2009-12-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "546726" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox before 3.0.16 and 3.5.x before 3.5.6, and SeaMonkey before 2.0.1, allows remote attackers to associate spoofed content with an invalid URL by setting document.location to this URL, and then writing arbitrary web script or HTML to the associated blank document, a related issue to CVE-2009-2654.", "title": "Vulnerability description" }, { "category": "summary", "text": "Mozilla URL spoofing via invalid document.location", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS:firefox-0:3.0.16-4.el4.i386", "4AS:firefox-0:3.0.16-4.el4.ia64", "4AS:firefox-0:3.0.16-4.el4.ppc", "4AS:firefox-0:3.0.16-4.el4.s390", "4AS:firefox-0:3.0.16-4.el4.s390x", "4AS:firefox-0:3.0.16-4.el4.src", "4AS:firefox-0:3.0.16-4.el4.x86_64", "4AS:firefox-debuginfo-0:3.0.16-4.el4.i386", "4AS:firefox-debuginfo-0:3.0.16-4.el4.ia64", "4AS:firefox-debuginfo-0:3.0.16-4.el4.ppc", "4AS:firefox-debuginfo-0:3.0.16-4.el4.s390", "4AS:firefox-debuginfo-0:3.0.16-4.el4.s390x", "4AS:firefox-debuginfo-0:3.0.16-4.el4.x86_64", "4Desktop:firefox-0:3.0.16-4.el4.i386", "4Desktop:firefox-0:3.0.16-4.el4.ia64", "4Desktop:firefox-0:3.0.16-4.el4.ppc", "4Desktop:firefox-0:3.0.16-4.el4.s390", "4Desktop:firefox-0:3.0.16-4.el4.s390x", "4Desktop:firefox-0:3.0.16-4.el4.src", "4Desktop:firefox-0:3.0.16-4.el4.x86_64", "4Desktop:firefox-debuginfo-0:3.0.16-4.el4.i386", "4Desktop:firefox-debuginfo-0:3.0.16-4.el4.ia64", "4Desktop:firefox-debuginfo-0:3.0.16-4.el4.ppc", "4Desktop:firefox-debuginfo-0:3.0.16-4.el4.s390", "4Desktop:firefox-debuginfo-0:3.0.16-4.el4.s390x", "4Desktop:firefox-debuginfo-0:3.0.16-4.el4.x86_64", "4ES:firefox-0:3.0.16-4.el4.i386", "4ES:firefox-0:3.0.16-4.el4.ia64", "4ES:firefox-0:3.0.16-4.el4.ppc", "4ES:firefox-0:3.0.16-4.el4.s390", "4ES:firefox-0:3.0.16-4.el4.s390x", "4ES:firefox-0:3.0.16-4.el4.src", "4ES:firefox-0:3.0.16-4.el4.x86_64", "4ES:firefox-debuginfo-0:3.0.16-4.el4.i386", "4ES:firefox-debuginfo-0:3.0.16-4.el4.ia64", "4ES:firefox-debuginfo-0:3.0.16-4.el4.ppc", "4ES:firefox-debuginfo-0:3.0.16-4.el4.s390", "4ES:firefox-debuginfo-0:3.0.16-4.el4.s390x", "4ES:firefox-debuginfo-0:3.0.16-4.el4.x86_64", "4WS:firefox-0:3.0.16-4.el4.i386", "4WS:firefox-0:3.0.16-4.el4.ia64", "4WS:firefox-0:3.0.16-4.el4.ppc", "4WS:firefox-0:3.0.16-4.el4.s390", "4WS:firefox-0:3.0.16-4.el4.s390x", "4WS:firefox-0:3.0.16-4.el4.src", "4WS:firefox-0:3.0.16-4.el4.x86_64", "4WS:firefox-debuginfo-0:3.0.16-4.el4.i386", "4WS:firefox-debuginfo-0:3.0.16-4.el4.ia64", "4WS:firefox-debuginfo-0:3.0.16-4.el4.ppc", "4WS:firefox-debuginfo-0:3.0.16-4.el4.s390", "4WS:firefox-debuginfo-0:3.0.16-4.el4.s390x", "4WS:firefox-debuginfo-0:3.0.16-4.el4.x86_64", "5Client-Workstation:xulrunner-0:1.9.0.16-2.el5_4.i386", "5Client-Workstation:xulrunner-0:1.9.0.16-2.el5_4.ia64", "5Client-Workstation:xulrunner-0:1.9.0.16-2.el5_4.ppc", "5Client-Workstation:xulrunner-0:1.9.0.16-2.el5_4.ppc64", "5Client-Workstation:xulrunner-0:1.9.0.16-2.el5_4.s390", "5Client-Workstation:xulrunner-0:1.9.0.16-2.el5_4.s390x", "5Client-Workstation:xulrunner-0:1.9.0.16-2.el5_4.src", "5Client-Workstation:xulrunner-0:1.9.0.16-2.el5_4.x86_64", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.i386", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ia64", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ppc", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ppc64", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.s390", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.s390x", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.x86_64", "5Client-Workstation:xulrunner-devel-0:1.9.0.16-2.el5_4.i386", "5Client-Workstation:xulrunner-devel-0:1.9.0.16-2.el5_4.ia64", "5Client-Workstation:xulrunner-devel-0:1.9.0.16-2.el5_4.ppc", "5Client-Workstation:xulrunner-devel-0:1.9.0.16-2.el5_4.ppc64", "5Client-Workstation:xulrunner-devel-0:1.9.0.16-2.el5_4.s390", "5Client-Workstation:xulrunner-devel-0:1.9.0.16-2.el5_4.s390x", "5Client-Workstation:xulrunner-devel-0:1.9.0.16-2.el5_4.x86_64", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.i386", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.ia64", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.ppc", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.s390x", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.x86_64", "5Client:firefox-0:3.0.16-1.el5_4.i386", "5Client:firefox-0:3.0.16-1.el5_4.ia64", "5Client:firefox-0:3.0.16-1.el5_4.ppc", "5Client:firefox-0:3.0.16-1.el5_4.s390", "5Client:firefox-0:3.0.16-1.el5_4.s390x", "5Client:firefox-0:3.0.16-1.el5_4.src", "5Client:firefox-0:3.0.16-1.el5_4.x86_64", "5Client:firefox-debuginfo-0:3.0.16-1.el5_4.i386", "5Client:firefox-debuginfo-0:3.0.16-1.el5_4.ia64", "5Client:firefox-debuginfo-0:3.0.16-1.el5_4.ppc", "5Client:firefox-debuginfo-0:3.0.16-1.el5_4.s390", "5Client:firefox-debuginfo-0:3.0.16-1.el5_4.s390x", "5Client:firefox-debuginfo-0:3.0.16-1.el5_4.x86_64", "5Client:xulrunner-0:1.9.0.16-2.el5_4.i386", "5Client:xulrunner-0:1.9.0.16-2.el5_4.ia64", "5Client:xulrunner-0:1.9.0.16-2.el5_4.ppc", "5Client:xulrunner-0:1.9.0.16-2.el5_4.ppc64", "5Client:xulrunner-0:1.9.0.16-2.el5_4.s390", "5Client:xulrunner-0:1.9.0.16-2.el5_4.s390x", "5Client:xulrunner-0:1.9.0.16-2.el5_4.src", "5Client:xulrunner-0:1.9.0.16-2.el5_4.x86_64", "5Client:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.i386", "5Client:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ia64", "5Client:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ppc", "5Client:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ppc64", "5Client:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.s390", "5Client:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.s390x", "5Client:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.x86_64", "5Client:xulrunner-devel-0:1.9.0.16-2.el5_4.i386", "5Client:xulrunner-devel-0:1.9.0.16-2.el5_4.ia64", "5Client:xulrunner-devel-0:1.9.0.16-2.el5_4.ppc", "5Client:xulrunner-devel-0:1.9.0.16-2.el5_4.ppc64", "5Client:xulrunner-devel-0:1.9.0.16-2.el5_4.s390", "5Client:xulrunner-devel-0:1.9.0.16-2.el5_4.s390x", "5Client:xulrunner-devel-0:1.9.0.16-2.el5_4.x86_64", "5Client:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.i386", "5Client:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.ia64", "5Client:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.ppc", "5Client:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.s390x", "5Client:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.x86_64", "5Server:firefox-0:3.0.16-1.el5_4.i386", "5Server:firefox-0:3.0.16-1.el5_4.ia64", "5Server:firefox-0:3.0.16-1.el5_4.ppc", "5Server:firefox-0:3.0.16-1.el5_4.s390", "5Server:firefox-0:3.0.16-1.el5_4.s390x", "5Server:firefox-0:3.0.16-1.el5_4.src", "5Server:firefox-0:3.0.16-1.el5_4.x86_64", "5Server:firefox-debuginfo-0:3.0.16-1.el5_4.i386", "5Server:firefox-debuginfo-0:3.0.16-1.el5_4.ia64", "5Server:firefox-debuginfo-0:3.0.16-1.el5_4.ppc", "5Server:firefox-debuginfo-0:3.0.16-1.el5_4.s390", "5Server:firefox-debuginfo-0:3.0.16-1.el5_4.s390x", "5Server:firefox-debuginfo-0:3.0.16-1.el5_4.x86_64", "5Server:xulrunner-0:1.9.0.16-2.el5_4.i386", "5Server:xulrunner-0:1.9.0.16-2.el5_4.ia64", "5Server:xulrunner-0:1.9.0.16-2.el5_4.ppc", "5Server:xulrunner-0:1.9.0.16-2.el5_4.ppc64", "5Server:xulrunner-0:1.9.0.16-2.el5_4.s390", "5Server:xulrunner-0:1.9.0.16-2.el5_4.s390x", "5Server:xulrunner-0:1.9.0.16-2.el5_4.src", "5Server:xulrunner-0:1.9.0.16-2.el5_4.x86_64", "5Server:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.i386", "5Server:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ia64", "5Server:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ppc", "5Server:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ppc64", "5Server:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.s390", "5Server:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.s390x", "5Server:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.x86_64", "5Server:xulrunner-devel-0:1.9.0.16-2.el5_4.i386", "5Server:xulrunner-devel-0:1.9.0.16-2.el5_4.ia64", "5Server:xulrunner-devel-0:1.9.0.16-2.el5_4.ppc", "5Server:xulrunner-devel-0:1.9.0.16-2.el5_4.ppc64", "5Server:xulrunner-devel-0:1.9.0.16-2.el5_4.s390", "5Server:xulrunner-devel-0:1.9.0.16-2.el5_4.s390x", "5Server:xulrunner-devel-0:1.9.0.16-2.el5_4.x86_64", "5Server:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.i386", "5Server:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.ia64", "5Server:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.ppc", "5Server:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.s390x", "5Server:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-3985" }, { "category": "external", "summary": "RHBZ#546726", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=546726" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3985", "url": "https://www.cve.org/CVERecord?id=CVE-2009-3985" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3985", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3985" } ], "release_date": "2009-12-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-12-16T04:56:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS:firefox-0:3.0.16-4.el4.i386", "4AS:firefox-0:3.0.16-4.el4.ia64", "4AS:firefox-0:3.0.16-4.el4.ppc", "4AS:firefox-0:3.0.16-4.el4.s390", "4AS:firefox-0:3.0.16-4.el4.s390x", "4AS:firefox-0:3.0.16-4.el4.src", "4AS:firefox-0:3.0.16-4.el4.x86_64", "4AS:firefox-debuginfo-0:3.0.16-4.el4.i386", "4AS:firefox-debuginfo-0:3.0.16-4.el4.ia64", "4AS:firefox-debuginfo-0:3.0.16-4.el4.ppc", "4AS:firefox-debuginfo-0:3.0.16-4.el4.s390", "4AS:firefox-debuginfo-0:3.0.16-4.el4.s390x", "4AS:firefox-debuginfo-0:3.0.16-4.el4.x86_64", "4Desktop:firefox-0:3.0.16-4.el4.i386", "4Desktop:firefox-0:3.0.16-4.el4.ia64", "4Desktop:firefox-0:3.0.16-4.el4.ppc", "4Desktop:firefox-0:3.0.16-4.el4.s390", "4Desktop:firefox-0:3.0.16-4.el4.s390x", "4Desktop:firefox-0:3.0.16-4.el4.src", "4Desktop:firefox-0:3.0.16-4.el4.x86_64", "4Desktop:firefox-debuginfo-0:3.0.16-4.el4.i386", "4Desktop:firefox-debuginfo-0:3.0.16-4.el4.ia64", "4Desktop:firefox-debuginfo-0:3.0.16-4.el4.ppc", "4Desktop:firefox-debuginfo-0:3.0.16-4.el4.s390", "4Desktop:firefox-debuginfo-0:3.0.16-4.el4.s390x", "4Desktop:firefox-debuginfo-0:3.0.16-4.el4.x86_64", "4ES:firefox-0:3.0.16-4.el4.i386", "4ES:firefox-0:3.0.16-4.el4.ia64", "4ES:firefox-0:3.0.16-4.el4.ppc", "4ES:firefox-0:3.0.16-4.el4.s390", "4ES:firefox-0:3.0.16-4.el4.s390x", "4ES:firefox-0:3.0.16-4.el4.src", "4ES:firefox-0:3.0.16-4.el4.x86_64", "4ES:firefox-debuginfo-0:3.0.16-4.el4.i386", "4ES:firefox-debuginfo-0:3.0.16-4.el4.ia64", "4ES:firefox-debuginfo-0:3.0.16-4.el4.ppc", "4ES:firefox-debuginfo-0:3.0.16-4.el4.s390", "4ES:firefox-debuginfo-0:3.0.16-4.el4.s390x", "4ES:firefox-debuginfo-0:3.0.16-4.el4.x86_64", "4WS:firefox-0:3.0.16-4.el4.i386", "4WS:firefox-0:3.0.16-4.el4.ia64", "4WS:firefox-0:3.0.16-4.el4.ppc", "4WS:firefox-0:3.0.16-4.el4.s390", "4WS:firefox-0:3.0.16-4.el4.s390x", "4WS:firefox-0:3.0.16-4.el4.src", "4WS:firefox-0:3.0.16-4.el4.x86_64", "4WS:firefox-debuginfo-0:3.0.16-4.el4.i386", "4WS:firefox-debuginfo-0:3.0.16-4.el4.ia64", "4WS:firefox-debuginfo-0:3.0.16-4.el4.ppc", "4WS:firefox-debuginfo-0:3.0.16-4.el4.s390", "4WS:firefox-debuginfo-0:3.0.16-4.el4.s390x", "4WS:firefox-debuginfo-0:3.0.16-4.el4.x86_64", "5Client-Workstation:xulrunner-0:1.9.0.16-2.el5_4.i386", "5Client-Workstation:xulrunner-0:1.9.0.16-2.el5_4.ia64", "5Client-Workstation:xulrunner-0:1.9.0.16-2.el5_4.ppc", "5Client-Workstation:xulrunner-0:1.9.0.16-2.el5_4.ppc64", "5Client-Workstation:xulrunner-0:1.9.0.16-2.el5_4.s390", "5Client-Workstation:xulrunner-0:1.9.0.16-2.el5_4.s390x", "5Client-Workstation:xulrunner-0:1.9.0.16-2.el5_4.src", "5Client-Workstation:xulrunner-0:1.9.0.16-2.el5_4.x86_64", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.i386", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ia64", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ppc", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ppc64", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.s390", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.s390x", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.x86_64", "5Client-Workstation:xulrunner-devel-0:1.9.0.16-2.el5_4.i386", "5Client-Workstation:xulrunner-devel-0:1.9.0.16-2.el5_4.ia64", "5Client-Workstation:xulrunner-devel-0:1.9.0.16-2.el5_4.ppc", "5Client-Workstation:xulrunner-devel-0:1.9.0.16-2.el5_4.ppc64", "5Client-Workstation:xulrunner-devel-0:1.9.0.16-2.el5_4.s390", "5Client-Workstation:xulrunner-devel-0:1.9.0.16-2.el5_4.s390x", "5Client-Workstation:xulrunner-devel-0:1.9.0.16-2.el5_4.x86_64", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.i386", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.ia64", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.ppc", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.s390x", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.x86_64", "5Client:firefox-0:3.0.16-1.el5_4.i386", "5Client:firefox-0:3.0.16-1.el5_4.ia64", "5Client:firefox-0:3.0.16-1.el5_4.ppc", "5Client:firefox-0:3.0.16-1.el5_4.s390", "5Client:firefox-0:3.0.16-1.el5_4.s390x", "5Client:firefox-0:3.0.16-1.el5_4.src", "5Client:firefox-0:3.0.16-1.el5_4.x86_64", "5Client:firefox-debuginfo-0:3.0.16-1.el5_4.i386", "5Client:firefox-debuginfo-0:3.0.16-1.el5_4.ia64", "5Client:firefox-debuginfo-0:3.0.16-1.el5_4.ppc", "5Client:firefox-debuginfo-0:3.0.16-1.el5_4.s390", "5Client:firefox-debuginfo-0:3.0.16-1.el5_4.s390x", "5Client:firefox-debuginfo-0:3.0.16-1.el5_4.x86_64", "5Client:xulrunner-0:1.9.0.16-2.el5_4.i386", "5Client:xulrunner-0:1.9.0.16-2.el5_4.ia64", "5Client:xulrunner-0:1.9.0.16-2.el5_4.ppc", "5Client:xulrunner-0:1.9.0.16-2.el5_4.ppc64", "5Client:xulrunner-0:1.9.0.16-2.el5_4.s390", "5Client:xulrunner-0:1.9.0.16-2.el5_4.s390x", "5Client:xulrunner-0:1.9.0.16-2.el5_4.src", "5Client:xulrunner-0:1.9.0.16-2.el5_4.x86_64", "5Client:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.i386", "5Client:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ia64", "5Client:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ppc", "5Client:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ppc64", "5Client:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.s390", "5Client:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.s390x", "5Client:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.x86_64", "5Client:xulrunner-devel-0:1.9.0.16-2.el5_4.i386", "5Client:xulrunner-devel-0:1.9.0.16-2.el5_4.ia64", "5Client:xulrunner-devel-0:1.9.0.16-2.el5_4.ppc", "5Client:xulrunner-devel-0:1.9.0.16-2.el5_4.ppc64", "5Client:xulrunner-devel-0:1.9.0.16-2.el5_4.s390", "5Client:xulrunner-devel-0:1.9.0.16-2.el5_4.s390x", "5Client:xulrunner-devel-0:1.9.0.16-2.el5_4.x86_64", "5Client:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.i386", "5Client:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.ia64", "5Client:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.ppc", "5Client:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.s390x", "5Client:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.x86_64", "5Server:firefox-0:3.0.16-1.el5_4.i386", "5Server:firefox-0:3.0.16-1.el5_4.ia64", "5Server:firefox-0:3.0.16-1.el5_4.ppc", "5Server:firefox-0:3.0.16-1.el5_4.s390", "5Server:firefox-0:3.0.16-1.el5_4.s390x", "5Server:firefox-0:3.0.16-1.el5_4.src", "5Server:firefox-0:3.0.16-1.el5_4.x86_64", "5Server:firefox-debuginfo-0:3.0.16-1.el5_4.i386", "5Server:firefox-debuginfo-0:3.0.16-1.el5_4.ia64", "5Server:firefox-debuginfo-0:3.0.16-1.el5_4.ppc", "5Server:firefox-debuginfo-0:3.0.16-1.el5_4.s390", "5Server:firefox-debuginfo-0:3.0.16-1.el5_4.s390x", "5Server:firefox-debuginfo-0:3.0.16-1.el5_4.x86_64", "5Server:xulrunner-0:1.9.0.16-2.el5_4.i386", "5Server:xulrunner-0:1.9.0.16-2.el5_4.ia64", "5Server:xulrunner-0:1.9.0.16-2.el5_4.ppc", "5Server:xulrunner-0:1.9.0.16-2.el5_4.ppc64", "5Server:xulrunner-0:1.9.0.16-2.el5_4.s390", "5Server:xulrunner-0:1.9.0.16-2.el5_4.s390x", "5Server:xulrunner-0:1.9.0.16-2.el5_4.src", "5Server:xulrunner-0:1.9.0.16-2.el5_4.x86_64", "5Server:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.i386", "5Server:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ia64", "5Server:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ppc", "5Server:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ppc64", "5Server:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.s390", "5Server:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.s390x", "5Server:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.x86_64", "5Server:xulrunner-devel-0:1.9.0.16-2.el5_4.i386", "5Server:xulrunner-devel-0:1.9.0.16-2.el5_4.ia64", "5Server:xulrunner-devel-0:1.9.0.16-2.el5_4.ppc", "5Server:xulrunner-devel-0:1.9.0.16-2.el5_4.ppc64", "5Server:xulrunner-devel-0:1.9.0.16-2.el5_4.s390", "5Server:xulrunner-devel-0:1.9.0.16-2.el5_4.s390x", "5Server:xulrunner-devel-0:1.9.0.16-2.el5_4.x86_64", "5Server:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.i386", "5Server:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.ia64", "5Server:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.ppc", "5Server:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.s390x", "5Server:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1674" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "4AS:firefox-0:3.0.16-4.el4.i386", "4AS:firefox-0:3.0.16-4.el4.ia64", "4AS:firefox-0:3.0.16-4.el4.ppc", "4AS:firefox-0:3.0.16-4.el4.s390", "4AS:firefox-0:3.0.16-4.el4.s390x", "4AS:firefox-0:3.0.16-4.el4.src", "4AS:firefox-0:3.0.16-4.el4.x86_64", "4AS:firefox-debuginfo-0:3.0.16-4.el4.i386", "4AS:firefox-debuginfo-0:3.0.16-4.el4.ia64", "4AS:firefox-debuginfo-0:3.0.16-4.el4.ppc", "4AS:firefox-debuginfo-0:3.0.16-4.el4.s390", "4AS:firefox-debuginfo-0:3.0.16-4.el4.s390x", "4AS:firefox-debuginfo-0:3.0.16-4.el4.x86_64", "4Desktop:firefox-0:3.0.16-4.el4.i386", "4Desktop:firefox-0:3.0.16-4.el4.ia64", "4Desktop:firefox-0:3.0.16-4.el4.ppc", "4Desktop:firefox-0:3.0.16-4.el4.s390", "4Desktop:firefox-0:3.0.16-4.el4.s390x", "4Desktop:firefox-0:3.0.16-4.el4.src", "4Desktop:firefox-0:3.0.16-4.el4.x86_64", "4Desktop:firefox-debuginfo-0:3.0.16-4.el4.i386", "4Desktop:firefox-debuginfo-0:3.0.16-4.el4.ia64", "4Desktop:firefox-debuginfo-0:3.0.16-4.el4.ppc", "4Desktop:firefox-debuginfo-0:3.0.16-4.el4.s390", "4Desktop:firefox-debuginfo-0:3.0.16-4.el4.s390x", "4Desktop:firefox-debuginfo-0:3.0.16-4.el4.x86_64", "4ES:firefox-0:3.0.16-4.el4.i386", "4ES:firefox-0:3.0.16-4.el4.ia64", "4ES:firefox-0:3.0.16-4.el4.ppc", "4ES:firefox-0:3.0.16-4.el4.s390", "4ES:firefox-0:3.0.16-4.el4.s390x", "4ES:firefox-0:3.0.16-4.el4.src", "4ES:firefox-0:3.0.16-4.el4.x86_64", "4ES:firefox-debuginfo-0:3.0.16-4.el4.i386", "4ES:firefox-debuginfo-0:3.0.16-4.el4.ia64", "4ES:firefox-debuginfo-0:3.0.16-4.el4.ppc", "4ES:firefox-debuginfo-0:3.0.16-4.el4.s390", "4ES:firefox-debuginfo-0:3.0.16-4.el4.s390x", "4ES:firefox-debuginfo-0:3.0.16-4.el4.x86_64", "4WS:firefox-0:3.0.16-4.el4.i386", "4WS:firefox-0:3.0.16-4.el4.ia64", "4WS:firefox-0:3.0.16-4.el4.ppc", "4WS:firefox-0:3.0.16-4.el4.s390", "4WS:firefox-0:3.0.16-4.el4.s390x", "4WS:firefox-0:3.0.16-4.el4.src", "4WS:firefox-0:3.0.16-4.el4.x86_64", "4WS:firefox-debuginfo-0:3.0.16-4.el4.i386", "4WS:firefox-debuginfo-0:3.0.16-4.el4.ia64", "4WS:firefox-debuginfo-0:3.0.16-4.el4.ppc", "4WS:firefox-debuginfo-0:3.0.16-4.el4.s390", "4WS:firefox-debuginfo-0:3.0.16-4.el4.s390x", "4WS:firefox-debuginfo-0:3.0.16-4.el4.x86_64", "5Client-Workstation:xulrunner-0:1.9.0.16-2.el5_4.i386", "5Client-Workstation:xulrunner-0:1.9.0.16-2.el5_4.ia64", "5Client-Workstation:xulrunner-0:1.9.0.16-2.el5_4.ppc", "5Client-Workstation:xulrunner-0:1.9.0.16-2.el5_4.ppc64", "5Client-Workstation:xulrunner-0:1.9.0.16-2.el5_4.s390", "5Client-Workstation:xulrunner-0:1.9.0.16-2.el5_4.s390x", "5Client-Workstation:xulrunner-0:1.9.0.16-2.el5_4.src", "5Client-Workstation:xulrunner-0:1.9.0.16-2.el5_4.x86_64", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.i386", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ia64", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ppc", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ppc64", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.s390", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.s390x", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.x86_64", "5Client-Workstation:xulrunner-devel-0:1.9.0.16-2.el5_4.i386", "5Client-Workstation:xulrunner-devel-0:1.9.0.16-2.el5_4.ia64", "5Client-Workstation:xulrunner-devel-0:1.9.0.16-2.el5_4.ppc", "5Client-Workstation:xulrunner-devel-0:1.9.0.16-2.el5_4.ppc64", "5Client-Workstation:xulrunner-devel-0:1.9.0.16-2.el5_4.s390", "5Client-Workstation:xulrunner-devel-0:1.9.0.16-2.el5_4.s390x", "5Client-Workstation:xulrunner-devel-0:1.9.0.16-2.el5_4.x86_64", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.i386", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.ia64", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.ppc", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.s390x", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.x86_64", "5Client:firefox-0:3.0.16-1.el5_4.i386", "5Client:firefox-0:3.0.16-1.el5_4.ia64", "5Client:firefox-0:3.0.16-1.el5_4.ppc", "5Client:firefox-0:3.0.16-1.el5_4.s390", "5Client:firefox-0:3.0.16-1.el5_4.s390x", "5Client:firefox-0:3.0.16-1.el5_4.src", "5Client:firefox-0:3.0.16-1.el5_4.x86_64", "5Client:firefox-debuginfo-0:3.0.16-1.el5_4.i386", "5Client:firefox-debuginfo-0:3.0.16-1.el5_4.ia64", "5Client:firefox-debuginfo-0:3.0.16-1.el5_4.ppc", "5Client:firefox-debuginfo-0:3.0.16-1.el5_4.s390", "5Client:firefox-debuginfo-0:3.0.16-1.el5_4.s390x", "5Client:firefox-debuginfo-0:3.0.16-1.el5_4.x86_64", "5Client:xulrunner-0:1.9.0.16-2.el5_4.i386", "5Client:xulrunner-0:1.9.0.16-2.el5_4.ia64", "5Client:xulrunner-0:1.9.0.16-2.el5_4.ppc", "5Client:xulrunner-0:1.9.0.16-2.el5_4.ppc64", "5Client:xulrunner-0:1.9.0.16-2.el5_4.s390", "5Client:xulrunner-0:1.9.0.16-2.el5_4.s390x", "5Client:xulrunner-0:1.9.0.16-2.el5_4.src", "5Client:xulrunner-0:1.9.0.16-2.el5_4.x86_64", "5Client:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.i386", "5Client:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ia64", "5Client:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ppc", "5Client:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ppc64", "5Client:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.s390", "5Client:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.s390x", "5Client:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.x86_64", "5Client:xulrunner-devel-0:1.9.0.16-2.el5_4.i386", "5Client:xulrunner-devel-0:1.9.0.16-2.el5_4.ia64", "5Client:xulrunner-devel-0:1.9.0.16-2.el5_4.ppc", "5Client:xulrunner-devel-0:1.9.0.16-2.el5_4.ppc64", "5Client:xulrunner-devel-0:1.9.0.16-2.el5_4.s390", "5Client:xulrunner-devel-0:1.9.0.16-2.el5_4.s390x", "5Client:xulrunner-devel-0:1.9.0.16-2.el5_4.x86_64", "5Client:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.i386", "5Client:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.ia64", "5Client:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.ppc", "5Client:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.s390x", "5Client:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.x86_64", "5Server:firefox-0:3.0.16-1.el5_4.i386", "5Server:firefox-0:3.0.16-1.el5_4.ia64", "5Server:firefox-0:3.0.16-1.el5_4.ppc", "5Server:firefox-0:3.0.16-1.el5_4.s390", "5Server:firefox-0:3.0.16-1.el5_4.s390x", "5Server:firefox-0:3.0.16-1.el5_4.src", "5Server:firefox-0:3.0.16-1.el5_4.x86_64", "5Server:firefox-debuginfo-0:3.0.16-1.el5_4.i386", "5Server:firefox-debuginfo-0:3.0.16-1.el5_4.ia64", "5Server:firefox-debuginfo-0:3.0.16-1.el5_4.ppc", "5Server:firefox-debuginfo-0:3.0.16-1.el5_4.s390", "5Server:firefox-debuginfo-0:3.0.16-1.el5_4.s390x", "5Server:firefox-debuginfo-0:3.0.16-1.el5_4.x86_64", "5Server:xulrunner-0:1.9.0.16-2.el5_4.i386", "5Server:xulrunner-0:1.9.0.16-2.el5_4.ia64", "5Server:xulrunner-0:1.9.0.16-2.el5_4.ppc", "5Server:xulrunner-0:1.9.0.16-2.el5_4.ppc64", "5Server:xulrunner-0:1.9.0.16-2.el5_4.s390", "5Server:xulrunner-0:1.9.0.16-2.el5_4.s390x", "5Server:xulrunner-0:1.9.0.16-2.el5_4.src", "5Server:xulrunner-0:1.9.0.16-2.el5_4.x86_64", "5Server:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.i386", "5Server:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ia64", "5Server:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ppc", "5Server:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ppc64", "5Server:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.s390", "5Server:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.s390x", "5Server:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.x86_64", "5Server:xulrunner-devel-0:1.9.0.16-2.el5_4.i386", "5Server:xulrunner-devel-0:1.9.0.16-2.el5_4.ia64", "5Server:xulrunner-devel-0:1.9.0.16-2.el5_4.ppc", "5Server:xulrunner-devel-0:1.9.0.16-2.el5_4.ppc64", "5Server:xulrunner-devel-0:1.9.0.16-2.el5_4.s390", "5Server:xulrunner-devel-0:1.9.0.16-2.el5_4.s390x", "5Server:xulrunner-devel-0:1.9.0.16-2.el5_4.x86_64", "5Server:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.i386", "5Server:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.ia64", "5Server:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.ppc", "5Server:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.s390x", "5Server:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Mozilla URL spoofing via invalid document.location" }, { "cve": "CVE-2009-3986", "discovery_date": "2009-12-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "546724" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox before 3.0.16 and 3.5.x before 3.5.6, and SeaMonkey before 2.0.1, allows remote attackers to execute arbitrary JavaScript with chrome privileges by leveraging a reference to a chrome window from a content window, related to the window.opener property.", "title": "Vulnerability description" }, { "category": "summary", "text": "Mozilla Chrome privilege escalation via window.opener", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS:firefox-0:3.0.16-4.el4.i386", "4AS:firefox-0:3.0.16-4.el4.ia64", "4AS:firefox-0:3.0.16-4.el4.ppc", "4AS:firefox-0:3.0.16-4.el4.s390", "4AS:firefox-0:3.0.16-4.el4.s390x", "4AS:firefox-0:3.0.16-4.el4.src", "4AS:firefox-0:3.0.16-4.el4.x86_64", "4AS:firefox-debuginfo-0:3.0.16-4.el4.i386", "4AS:firefox-debuginfo-0:3.0.16-4.el4.ia64", "4AS:firefox-debuginfo-0:3.0.16-4.el4.ppc", "4AS:firefox-debuginfo-0:3.0.16-4.el4.s390", "4AS:firefox-debuginfo-0:3.0.16-4.el4.s390x", "4AS:firefox-debuginfo-0:3.0.16-4.el4.x86_64", "4Desktop:firefox-0:3.0.16-4.el4.i386", "4Desktop:firefox-0:3.0.16-4.el4.ia64", "4Desktop:firefox-0:3.0.16-4.el4.ppc", "4Desktop:firefox-0:3.0.16-4.el4.s390", "4Desktop:firefox-0:3.0.16-4.el4.s390x", "4Desktop:firefox-0:3.0.16-4.el4.src", "4Desktop:firefox-0:3.0.16-4.el4.x86_64", "4Desktop:firefox-debuginfo-0:3.0.16-4.el4.i386", "4Desktop:firefox-debuginfo-0:3.0.16-4.el4.ia64", "4Desktop:firefox-debuginfo-0:3.0.16-4.el4.ppc", "4Desktop:firefox-debuginfo-0:3.0.16-4.el4.s390", "4Desktop:firefox-debuginfo-0:3.0.16-4.el4.s390x", "4Desktop:firefox-debuginfo-0:3.0.16-4.el4.x86_64", "4ES:firefox-0:3.0.16-4.el4.i386", "4ES:firefox-0:3.0.16-4.el4.ia64", "4ES:firefox-0:3.0.16-4.el4.ppc", "4ES:firefox-0:3.0.16-4.el4.s390", "4ES:firefox-0:3.0.16-4.el4.s390x", "4ES:firefox-0:3.0.16-4.el4.src", "4ES:firefox-0:3.0.16-4.el4.x86_64", "4ES:firefox-debuginfo-0:3.0.16-4.el4.i386", "4ES:firefox-debuginfo-0:3.0.16-4.el4.ia64", "4ES:firefox-debuginfo-0:3.0.16-4.el4.ppc", "4ES:firefox-debuginfo-0:3.0.16-4.el4.s390", "4ES:firefox-debuginfo-0:3.0.16-4.el4.s390x", "4ES:firefox-debuginfo-0:3.0.16-4.el4.x86_64", "4WS:firefox-0:3.0.16-4.el4.i386", "4WS:firefox-0:3.0.16-4.el4.ia64", "4WS:firefox-0:3.0.16-4.el4.ppc", "4WS:firefox-0:3.0.16-4.el4.s390", "4WS:firefox-0:3.0.16-4.el4.s390x", "4WS:firefox-0:3.0.16-4.el4.src", "4WS:firefox-0:3.0.16-4.el4.x86_64", "4WS:firefox-debuginfo-0:3.0.16-4.el4.i386", "4WS:firefox-debuginfo-0:3.0.16-4.el4.ia64", "4WS:firefox-debuginfo-0:3.0.16-4.el4.ppc", "4WS:firefox-debuginfo-0:3.0.16-4.el4.s390", "4WS:firefox-debuginfo-0:3.0.16-4.el4.s390x", "4WS:firefox-debuginfo-0:3.0.16-4.el4.x86_64", "5Client-Workstation:xulrunner-0:1.9.0.16-2.el5_4.i386", "5Client-Workstation:xulrunner-0:1.9.0.16-2.el5_4.ia64", "5Client-Workstation:xulrunner-0:1.9.0.16-2.el5_4.ppc", "5Client-Workstation:xulrunner-0:1.9.0.16-2.el5_4.ppc64", "5Client-Workstation:xulrunner-0:1.9.0.16-2.el5_4.s390", "5Client-Workstation:xulrunner-0:1.9.0.16-2.el5_4.s390x", "5Client-Workstation:xulrunner-0:1.9.0.16-2.el5_4.src", "5Client-Workstation:xulrunner-0:1.9.0.16-2.el5_4.x86_64", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.i386", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ia64", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ppc", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ppc64", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.s390", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.s390x", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.x86_64", "5Client-Workstation:xulrunner-devel-0:1.9.0.16-2.el5_4.i386", "5Client-Workstation:xulrunner-devel-0:1.9.0.16-2.el5_4.ia64", "5Client-Workstation:xulrunner-devel-0:1.9.0.16-2.el5_4.ppc", "5Client-Workstation:xulrunner-devel-0:1.9.0.16-2.el5_4.ppc64", "5Client-Workstation:xulrunner-devel-0:1.9.0.16-2.el5_4.s390", "5Client-Workstation:xulrunner-devel-0:1.9.0.16-2.el5_4.s390x", "5Client-Workstation:xulrunner-devel-0:1.9.0.16-2.el5_4.x86_64", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.i386", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.ia64", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.ppc", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.s390x", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.x86_64", "5Client:firefox-0:3.0.16-1.el5_4.i386", "5Client:firefox-0:3.0.16-1.el5_4.ia64", "5Client:firefox-0:3.0.16-1.el5_4.ppc", "5Client:firefox-0:3.0.16-1.el5_4.s390", "5Client:firefox-0:3.0.16-1.el5_4.s390x", "5Client:firefox-0:3.0.16-1.el5_4.src", "5Client:firefox-0:3.0.16-1.el5_4.x86_64", "5Client:firefox-debuginfo-0:3.0.16-1.el5_4.i386", "5Client:firefox-debuginfo-0:3.0.16-1.el5_4.ia64", "5Client:firefox-debuginfo-0:3.0.16-1.el5_4.ppc", "5Client:firefox-debuginfo-0:3.0.16-1.el5_4.s390", "5Client:firefox-debuginfo-0:3.0.16-1.el5_4.s390x", "5Client:firefox-debuginfo-0:3.0.16-1.el5_4.x86_64", "5Client:xulrunner-0:1.9.0.16-2.el5_4.i386", "5Client:xulrunner-0:1.9.0.16-2.el5_4.ia64", "5Client:xulrunner-0:1.9.0.16-2.el5_4.ppc", "5Client:xulrunner-0:1.9.0.16-2.el5_4.ppc64", "5Client:xulrunner-0:1.9.0.16-2.el5_4.s390", "5Client:xulrunner-0:1.9.0.16-2.el5_4.s390x", "5Client:xulrunner-0:1.9.0.16-2.el5_4.src", "5Client:xulrunner-0:1.9.0.16-2.el5_4.x86_64", "5Client:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.i386", "5Client:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ia64", "5Client:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ppc", "5Client:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ppc64", "5Client:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.s390", "5Client:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.s390x", "5Client:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.x86_64", "5Client:xulrunner-devel-0:1.9.0.16-2.el5_4.i386", "5Client:xulrunner-devel-0:1.9.0.16-2.el5_4.ia64", "5Client:xulrunner-devel-0:1.9.0.16-2.el5_4.ppc", "5Client:xulrunner-devel-0:1.9.0.16-2.el5_4.ppc64", "5Client:xulrunner-devel-0:1.9.0.16-2.el5_4.s390", "5Client:xulrunner-devel-0:1.9.0.16-2.el5_4.s390x", "5Client:xulrunner-devel-0:1.9.0.16-2.el5_4.x86_64", "5Client:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.i386", "5Client:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.ia64", "5Client:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.ppc", "5Client:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.s390x", "5Client:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.x86_64", "5Server:firefox-0:3.0.16-1.el5_4.i386", "5Server:firefox-0:3.0.16-1.el5_4.ia64", "5Server:firefox-0:3.0.16-1.el5_4.ppc", "5Server:firefox-0:3.0.16-1.el5_4.s390", "5Server:firefox-0:3.0.16-1.el5_4.s390x", "5Server:firefox-0:3.0.16-1.el5_4.src", "5Server:firefox-0:3.0.16-1.el5_4.x86_64", "5Server:firefox-debuginfo-0:3.0.16-1.el5_4.i386", "5Server:firefox-debuginfo-0:3.0.16-1.el5_4.ia64", "5Server:firefox-debuginfo-0:3.0.16-1.el5_4.ppc", "5Server:firefox-debuginfo-0:3.0.16-1.el5_4.s390", "5Server:firefox-debuginfo-0:3.0.16-1.el5_4.s390x", "5Server:firefox-debuginfo-0:3.0.16-1.el5_4.x86_64", "5Server:xulrunner-0:1.9.0.16-2.el5_4.i386", "5Server:xulrunner-0:1.9.0.16-2.el5_4.ia64", "5Server:xulrunner-0:1.9.0.16-2.el5_4.ppc", "5Server:xulrunner-0:1.9.0.16-2.el5_4.ppc64", "5Server:xulrunner-0:1.9.0.16-2.el5_4.s390", "5Server:xulrunner-0:1.9.0.16-2.el5_4.s390x", "5Server:xulrunner-0:1.9.0.16-2.el5_4.src", "5Server:xulrunner-0:1.9.0.16-2.el5_4.x86_64", "5Server:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.i386", "5Server:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ia64", "5Server:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ppc", "5Server:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ppc64", "5Server:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.s390", "5Server:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.s390x", "5Server:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.x86_64", "5Server:xulrunner-devel-0:1.9.0.16-2.el5_4.i386", "5Server:xulrunner-devel-0:1.9.0.16-2.el5_4.ia64", "5Server:xulrunner-devel-0:1.9.0.16-2.el5_4.ppc", "5Server:xulrunner-devel-0:1.9.0.16-2.el5_4.ppc64", "5Server:xulrunner-devel-0:1.9.0.16-2.el5_4.s390", "5Server:xulrunner-devel-0:1.9.0.16-2.el5_4.s390x", "5Server:xulrunner-devel-0:1.9.0.16-2.el5_4.x86_64", "5Server:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.i386", "5Server:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.ia64", "5Server:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.ppc", "5Server:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.s390x", "5Server:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-3986" }, { "category": "external", "summary": "RHBZ#546724", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=546724" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3986", "url": "https://www.cve.org/CVERecord?id=CVE-2009-3986" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3986", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3986" } ], "release_date": "2009-12-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-12-16T04:56:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS:firefox-0:3.0.16-4.el4.i386", "4AS:firefox-0:3.0.16-4.el4.ia64", "4AS:firefox-0:3.0.16-4.el4.ppc", "4AS:firefox-0:3.0.16-4.el4.s390", "4AS:firefox-0:3.0.16-4.el4.s390x", "4AS:firefox-0:3.0.16-4.el4.src", "4AS:firefox-0:3.0.16-4.el4.x86_64", "4AS:firefox-debuginfo-0:3.0.16-4.el4.i386", "4AS:firefox-debuginfo-0:3.0.16-4.el4.ia64", "4AS:firefox-debuginfo-0:3.0.16-4.el4.ppc", "4AS:firefox-debuginfo-0:3.0.16-4.el4.s390", "4AS:firefox-debuginfo-0:3.0.16-4.el4.s390x", "4AS:firefox-debuginfo-0:3.0.16-4.el4.x86_64", "4Desktop:firefox-0:3.0.16-4.el4.i386", "4Desktop:firefox-0:3.0.16-4.el4.ia64", "4Desktop:firefox-0:3.0.16-4.el4.ppc", "4Desktop:firefox-0:3.0.16-4.el4.s390", "4Desktop:firefox-0:3.0.16-4.el4.s390x", "4Desktop:firefox-0:3.0.16-4.el4.src", "4Desktop:firefox-0:3.0.16-4.el4.x86_64", "4Desktop:firefox-debuginfo-0:3.0.16-4.el4.i386", "4Desktop:firefox-debuginfo-0:3.0.16-4.el4.ia64", "4Desktop:firefox-debuginfo-0:3.0.16-4.el4.ppc", "4Desktop:firefox-debuginfo-0:3.0.16-4.el4.s390", "4Desktop:firefox-debuginfo-0:3.0.16-4.el4.s390x", "4Desktop:firefox-debuginfo-0:3.0.16-4.el4.x86_64", "4ES:firefox-0:3.0.16-4.el4.i386", "4ES:firefox-0:3.0.16-4.el4.ia64", "4ES:firefox-0:3.0.16-4.el4.ppc", "4ES:firefox-0:3.0.16-4.el4.s390", "4ES:firefox-0:3.0.16-4.el4.s390x", "4ES:firefox-0:3.0.16-4.el4.src", "4ES:firefox-0:3.0.16-4.el4.x86_64", "4ES:firefox-debuginfo-0:3.0.16-4.el4.i386", "4ES:firefox-debuginfo-0:3.0.16-4.el4.ia64", "4ES:firefox-debuginfo-0:3.0.16-4.el4.ppc", "4ES:firefox-debuginfo-0:3.0.16-4.el4.s390", "4ES:firefox-debuginfo-0:3.0.16-4.el4.s390x", "4ES:firefox-debuginfo-0:3.0.16-4.el4.x86_64", "4WS:firefox-0:3.0.16-4.el4.i386", "4WS:firefox-0:3.0.16-4.el4.ia64", "4WS:firefox-0:3.0.16-4.el4.ppc", "4WS:firefox-0:3.0.16-4.el4.s390", "4WS:firefox-0:3.0.16-4.el4.s390x", "4WS:firefox-0:3.0.16-4.el4.src", "4WS:firefox-0:3.0.16-4.el4.x86_64", "4WS:firefox-debuginfo-0:3.0.16-4.el4.i386", "4WS:firefox-debuginfo-0:3.0.16-4.el4.ia64", "4WS:firefox-debuginfo-0:3.0.16-4.el4.ppc", "4WS:firefox-debuginfo-0:3.0.16-4.el4.s390", "4WS:firefox-debuginfo-0:3.0.16-4.el4.s390x", "4WS:firefox-debuginfo-0:3.0.16-4.el4.x86_64", "5Client-Workstation:xulrunner-0:1.9.0.16-2.el5_4.i386", "5Client-Workstation:xulrunner-0:1.9.0.16-2.el5_4.ia64", "5Client-Workstation:xulrunner-0:1.9.0.16-2.el5_4.ppc", "5Client-Workstation:xulrunner-0:1.9.0.16-2.el5_4.ppc64", "5Client-Workstation:xulrunner-0:1.9.0.16-2.el5_4.s390", "5Client-Workstation:xulrunner-0:1.9.0.16-2.el5_4.s390x", "5Client-Workstation:xulrunner-0:1.9.0.16-2.el5_4.src", "5Client-Workstation:xulrunner-0:1.9.0.16-2.el5_4.x86_64", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.i386", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ia64", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ppc", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ppc64", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.s390", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.s390x", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.x86_64", "5Client-Workstation:xulrunner-devel-0:1.9.0.16-2.el5_4.i386", "5Client-Workstation:xulrunner-devel-0:1.9.0.16-2.el5_4.ia64", "5Client-Workstation:xulrunner-devel-0:1.9.0.16-2.el5_4.ppc", "5Client-Workstation:xulrunner-devel-0:1.9.0.16-2.el5_4.ppc64", "5Client-Workstation:xulrunner-devel-0:1.9.0.16-2.el5_4.s390", "5Client-Workstation:xulrunner-devel-0:1.9.0.16-2.el5_4.s390x", "5Client-Workstation:xulrunner-devel-0:1.9.0.16-2.el5_4.x86_64", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.i386", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.ia64", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.ppc", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.s390x", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.x86_64", "5Client:firefox-0:3.0.16-1.el5_4.i386", "5Client:firefox-0:3.0.16-1.el5_4.ia64", "5Client:firefox-0:3.0.16-1.el5_4.ppc", "5Client:firefox-0:3.0.16-1.el5_4.s390", "5Client:firefox-0:3.0.16-1.el5_4.s390x", "5Client:firefox-0:3.0.16-1.el5_4.src", "5Client:firefox-0:3.0.16-1.el5_4.x86_64", "5Client:firefox-debuginfo-0:3.0.16-1.el5_4.i386", "5Client:firefox-debuginfo-0:3.0.16-1.el5_4.ia64", "5Client:firefox-debuginfo-0:3.0.16-1.el5_4.ppc", "5Client:firefox-debuginfo-0:3.0.16-1.el5_4.s390", "5Client:firefox-debuginfo-0:3.0.16-1.el5_4.s390x", "5Client:firefox-debuginfo-0:3.0.16-1.el5_4.x86_64", "5Client:xulrunner-0:1.9.0.16-2.el5_4.i386", "5Client:xulrunner-0:1.9.0.16-2.el5_4.ia64", "5Client:xulrunner-0:1.9.0.16-2.el5_4.ppc", "5Client:xulrunner-0:1.9.0.16-2.el5_4.ppc64", "5Client:xulrunner-0:1.9.0.16-2.el5_4.s390", "5Client:xulrunner-0:1.9.0.16-2.el5_4.s390x", "5Client:xulrunner-0:1.9.0.16-2.el5_4.src", "5Client:xulrunner-0:1.9.0.16-2.el5_4.x86_64", "5Client:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.i386", "5Client:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ia64", "5Client:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ppc", "5Client:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ppc64", "5Client:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.s390", "5Client:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.s390x", "5Client:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.x86_64", "5Client:xulrunner-devel-0:1.9.0.16-2.el5_4.i386", "5Client:xulrunner-devel-0:1.9.0.16-2.el5_4.ia64", "5Client:xulrunner-devel-0:1.9.0.16-2.el5_4.ppc", "5Client:xulrunner-devel-0:1.9.0.16-2.el5_4.ppc64", "5Client:xulrunner-devel-0:1.9.0.16-2.el5_4.s390", "5Client:xulrunner-devel-0:1.9.0.16-2.el5_4.s390x", "5Client:xulrunner-devel-0:1.9.0.16-2.el5_4.x86_64", "5Client:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.i386", "5Client:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.ia64", "5Client:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.ppc", "5Client:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.s390x", "5Client:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.x86_64", "5Server:firefox-0:3.0.16-1.el5_4.i386", "5Server:firefox-0:3.0.16-1.el5_4.ia64", "5Server:firefox-0:3.0.16-1.el5_4.ppc", "5Server:firefox-0:3.0.16-1.el5_4.s390", "5Server:firefox-0:3.0.16-1.el5_4.s390x", "5Server:firefox-0:3.0.16-1.el5_4.src", "5Server:firefox-0:3.0.16-1.el5_4.x86_64", "5Server:firefox-debuginfo-0:3.0.16-1.el5_4.i386", "5Server:firefox-debuginfo-0:3.0.16-1.el5_4.ia64", "5Server:firefox-debuginfo-0:3.0.16-1.el5_4.ppc", "5Server:firefox-debuginfo-0:3.0.16-1.el5_4.s390", "5Server:firefox-debuginfo-0:3.0.16-1.el5_4.s390x", "5Server:firefox-debuginfo-0:3.0.16-1.el5_4.x86_64", "5Server:xulrunner-0:1.9.0.16-2.el5_4.i386", "5Server:xulrunner-0:1.9.0.16-2.el5_4.ia64", "5Server:xulrunner-0:1.9.0.16-2.el5_4.ppc", "5Server:xulrunner-0:1.9.0.16-2.el5_4.ppc64", "5Server:xulrunner-0:1.9.0.16-2.el5_4.s390", "5Server:xulrunner-0:1.9.0.16-2.el5_4.s390x", "5Server:xulrunner-0:1.9.0.16-2.el5_4.src", "5Server:xulrunner-0:1.9.0.16-2.el5_4.x86_64", "5Server:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.i386", "5Server:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ia64", "5Server:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ppc", "5Server:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ppc64", "5Server:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.s390", "5Server:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.s390x", "5Server:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.x86_64", "5Server:xulrunner-devel-0:1.9.0.16-2.el5_4.i386", "5Server:xulrunner-devel-0:1.9.0.16-2.el5_4.ia64", "5Server:xulrunner-devel-0:1.9.0.16-2.el5_4.ppc", "5Server:xulrunner-devel-0:1.9.0.16-2.el5_4.ppc64", "5Server:xulrunner-devel-0:1.9.0.16-2.el5_4.s390", "5Server:xulrunner-devel-0:1.9.0.16-2.el5_4.s390x", "5Server:xulrunner-devel-0:1.9.0.16-2.el5_4.x86_64", "5Server:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.i386", "5Server:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.ia64", "5Server:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.ppc", "5Server:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.s390x", "5Server:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1674" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS:firefox-0:3.0.16-4.el4.i386", "4AS:firefox-0:3.0.16-4.el4.ia64", "4AS:firefox-0:3.0.16-4.el4.ppc", "4AS:firefox-0:3.0.16-4.el4.s390", "4AS:firefox-0:3.0.16-4.el4.s390x", "4AS:firefox-0:3.0.16-4.el4.src", "4AS:firefox-0:3.0.16-4.el4.x86_64", "4AS:firefox-debuginfo-0:3.0.16-4.el4.i386", "4AS:firefox-debuginfo-0:3.0.16-4.el4.ia64", "4AS:firefox-debuginfo-0:3.0.16-4.el4.ppc", "4AS:firefox-debuginfo-0:3.0.16-4.el4.s390", "4AS:firefox-debuginfo-0:3.0.16-4.el4.s390x", "4AS:firefox-debuginfo-0:3.0.16-4.el4.x86_64", "4Desktop:firefox-0:3.0.16-4.el4.i386", "4Desktop:firefox-0:3.0.16-4.el4.ia64", "4Desktop:firefox-0:3.0.16-4.el4.ppc", "4Desktop:firefox-0:3.0.16-4.el4.s390", "4Desktop:firefox-0:3.0.16-4.el4.s390x", "4Desktop:firefox-0:3.0.16-4.el4.src", "4Desktop:firefox-0:3.0.16-4.el4.x86_64", "4Desktop:firefox-debuginfo-0:3.0.16-4.el4.i386", "4Desktop:firefox-debuginfo-0:3.0.16-4.el4.ia64", "4Desktop:firefox-debuginfo-0:3.0.16-4.el4.ppc", "4Desktop:firefox-debuginfo-0:3.0.16-4.el4.s390", "4Desktop:firefox-debuginfo-0:3.0.16-4.el4.s390x", "4Desktop:firefox-debuginfo-0:3.0.16-4.el4.x86_64", "4ES:firefox-0:3.0.16-4.el4.i386", "4ES:firefox-0:3.0.16-4.el4.ia64", "4ES:firefox-0:3.0.16-4.el4.ppc", "4ES:firefox-0:3.0.16-4.el4.s390", "4ES:firefox-0:3.0.16-4.el4.s390x", "4ES:firefox-0:3.0.16-4.el4.src", "4ES:firefox-0:3.0.16-4.el4.x86_64", "4ES:firefox-debuginfo-0:3.0.16-4.el4.i386", "4ES:firefox-debuginfo-0:3.0.16-4.el4.ia64", "4ES:firefox-debuginfo-0:3.0.16-4.el4.ppc", "4ES:firefox-debuginfo-0:3.0.16-4.el4.s390", "4ES:firefox-debuginfo-0:3.0.16-4.el4.s390x", "4ES:firefox-debuginfo-0:3.0.16-4.el4.x86_64", "4WS:firefox-0:3.0.16-4.el4.i386", "4WS:firefox-0:3.0.16-4.el4.ia64", "4WS:firefox-0:3.0.16-4.el4.ppc", "4WS:firefox-0:3.0.16-4.el4.s390", "4WS:firefox-0:3.0.16-4.el4.s390x", "4WS:firefox-0:3.0.16-4.el4.src", "4WS:firefox-0:3.0.16-4.el4.x86_64", "4WS:firefox-debuginfo-0:3.0.16-4.el4.i386", "4WS:firefox-debuginfo-0:3.0.16-4.el4.ia64", "4WS:firefox-debuginfo-0:3.0.16-4.el4.ppc", "4WS:firefox-debuginfo-0:3.0.16-4.el4.s390", "4WS:firefox-debuginfo-0:3.0.16-4.el4.s390x", "4WS:firefox-debuginfo-0:3.0.16-4.el4.x86_64", "5Client-Workstation:xulrunner-0:1.9.0.16-2.el5_4.i386", "5Client-Workstation:xulrunner-0:1.9.0.16-2.el5_4.ia64", "5Client-Workstation:xulrunner-0:1.9.0.16-2.el5_4.ppc", "5Client-Workstation:xulrunner-0:1.9.0.16-2.el5_4.ppc64", "5Client-Workstation:xulrunner-0:1.9.0.16-2.el5_4.s390", "5Client-Workstation:xulrunner-0:1.9.0.16-2.el5_4.s390x", "5Client-Workstation:xulrunner-0:1.9.0.16-2.el5_4.src", "5Client-Workstation:xulrunner-0:1.9.0.16-2.el5_4.x86_64", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.i386", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ia64", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ppc", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ppc64", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.s390", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.s390x", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.x86_64", "5Client-Workstation:xulrunner-devel-0:1.9.0.16-2.el5_4.i386", "5Client-Workstation:xulrunner-devel-0:1.9.0.16-2.el5_4.ia64", "5Client-Workstation:xulrunner-devel-0:1.9.0.16-2.el5_4.ppc", "5Client-Workstation:xulrunner-devel-0:1.9.0.16-2.el5_4.ppc64", "5Client-Workstation:xulrunner-devel-0:1.9.0.16-2.el5_4.s390", "5Client-Workstation:xulrunner-devel-0:1.9.0.16-2.el5_4.s390x", "5Client-Workstation:xulrunner-devel-0:1.9.0.16-2.el5_4.x86_64", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.i386", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.ia64", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.ppc", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.s390x", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.x86_64", "5Client:firefox-0:3.0.16-1.el5_4.i386", "5Client:firefox-0:3.0.16-1.el5_4.ia64", "5Client:firefox-0:3.0.16-1.el5_4.ppc", "5Client:firefox-0:3.0.16-1.el5_4.s390", "5Client:firefox-0:3.0.16-1.el5_4.s390x", "5Client:firefox-0:3.0.16-1.el5_4.src", "5Client:firefox-0:3.0.16-1.el5_4.x86_64", "5Client:firefox-debuginfo-0:3.0.16-1.el5_4.i386", "5Client:firefox-debuginfo-0:3.0.16-1.el5_4.ia64", "5Client:firefox-debuginfo-0:3.0.16-1.el5_4.ppc", "5Client:firefox-debuginfo-0:3.0.16-1.el5_4.s390", "5Client:firefox-debuginfo-0:3.0.16-1.el5_4.s390x", "5Client:firefox-debuginfo-0:3.0.16-1.el5_4.x86_64", "5Client:xulrunner-0:1.9.0.16-2.el5_4.i386", "5Client:xulrunner-0:1.9.0.16-2.el5_4.ia64", "5Client:xulrunner-0:1.9.0.16-2.el5_4.ppc", "5Client:xulrunner-0:1.9.0.16-2.el5_4.ppc64", "5Client:xulrunner-0:1.9.0.16-2.el5_4.s390", "5Client:xulrunner-0:1.9.0.16-2.el5_4.s390x", "5Client:xulrunner-0:1.9.0.16-2.el5_4.src", "5Client:xulrunner-0:1.9.0.16-2.el5_4.x86_64", "5Client:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.i386", "5Client:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ia64", "5Client:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ppc", "5Client:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ppc64", "5Client:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.s390", "5Client:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.s390x", "5Client:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.x86_64", "5Client:xulrunner-devel-0:1.9.0.16-2.el5_4.i386", "5Client:xulrunner-devel-0:1.9.0.16-2.el5_4.ia64", "5Client:xulrunner-devel-0:1.9.0.16-2.el5_4.ppc", "5Client:xulrunner-devel-0:1.9.0.16-2.el5_4.ppc64", "5Client:xulrunner-devel-0:1.9.0.16-2.el5_4.s390", "5Client:xulrunner-devel-0:1.9.0.16-2.el5_4.s390x", "5Client:xulrunner-devel-0:1.9.0.16-2.el5_4.x86_64", "5Client:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.i386", "5Client:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.ia64", "5Client:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.ppc", "5Client:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.s390x", "5Client:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.x86_64", "5Server:firefox-0:3.0.16-1.el5_4.i386", "5Server:firefox-0:3.0.16-1.el5_4.ia64", "5Server:firefox-0:3.0.16-1.el5_4.ppc", "5Server:firefox-0:3.0.16-1.el5_4.s390", "5Server:firefox-0:3.0.16-1.el5_4.s390x", "5Server:firefox-0:3.0.16-1.el5_4.src", "5Server:firefox-0:3.0.16-1.el5_4.x86_64", "5Server:firefox-debuginfo-0:3.0.16-1.el5_4.i386", "5Server:firefox-debuginfo-0:3.0.16-1.el5_4.ia64", "5Server:firefox-debuginfo-0:3.0.16-1.el5_4.ppc", "5Server:firefox-debuginfo-0:3.0.16-1.el5_4.s390", "5Server:firefox-debuginfo-0:3.0.16-1.el5_4.s390x", "5Server:firefox-debuginfo-0:3.0.16-1.el5_4.x86_64", "5Server:xulrunner-0:1.9.0.16-2.el5_4.i386", "5Server:xulrunner-0:1.9.0.16-2.el5_4.ia64", "5Server:xulrunner-0:1.9.0.16-2.el5_4.ppc", "5Server:xulrunner-0:1.9.0.16-2.el5_4.ppc64", "5Server:xulrunner-0:1.9.0.16-2.el5_4.s390", "5Server:xulrunner-0:1.9.0.16-2.el5_4.s390x", "5Server:xulrunner-0:1.9.0.16-2.el5_4.src", "5Server:xulrunner-0:1.9.0.16-2.el5_4.x86_64", "5Server:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.i386", "5Server:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ia64", "5Server:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ppc", "5Server:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.ppc64", "5Server:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.s390", "5Server:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.s390x", "5Server:xulrunner-debuginfo-0:1.9.0.16-2.el5_4.x86_64", "5Server:xulrunner-devel-0:1.9.0.16-2.el5_4.i386", "5Server:xulrunner-devel-0:1.9.0.16-2.el5_4.ia64", "5Server:xulrunner-devel-0:1.9.0.16-2.el5_4.ppc", "5Server:xulrunner-devel-0:1.9.0.16-2.el5_4.ppc64", "5Server:xulrunner-devel-0:1.9.0.16-2.el5_4.s390", "5Server:xulrunner-devel-0:1.9.0.16-2.el5_4.s390x", "5Server:xulrunner-devel-0:1.9.0.16-2.el5_4.x86_64", "5Server:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.i386", "5Server:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.ia64", "5Server:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.ppc", "5Server:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.s390x", "5Server:xulrunner-devel-unstable-0:1.9.0.16-2.el5_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Mozilla Chrome privilege escalation via window.opener" } ] }
rhsa-2010_0153
Vulnerability from csaf_redhat
Published
2010-03-17 12:38
Modified
2024-11-22 03:23
Summary
Red Hat Security Advisory: thunderbird security update
Notes
Topic
An updated thunderbird package that fixes several security issues is now
available for Red Hat Enterprise Linux 5.
The Red Hat Security Response Team has rated this update as having moderate
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each vulnerability
from the CVE links in the References section.
Details
Mozilla Thunderbird is a standalone mail and newsgroup client.
Several flaws were found in the processing of malformed HTML mail content.
An HTML mail message containing malicious content could cause Thunderbird
to crash or, potentially, execute arbitrary code with the privileges of the
user running Thunderbird. (CVE-2009-2462, CVE-2009-2463, CVE-2009-2466,
CVE-2009-3072, CVE-2009-3075, CVE-2009-3380, CVE-2009-3979, CVE-2010-0159)
A use-after-free flaw was found in Thunderbird. An attacker could use this
flaw to crash Thunderbird or, potentially, execute arbitrary code with the
privileges of the user running Thunderbird. (CVE-2009-3077)
A heap-based buffer overflow flaw was found in the Thunderbird string to
floating point conversion routines. An HTML mail message containing
malicious JavaScript could crash Thunderbird or, potentially, execute
arbitrary code with the privileges of the user running Thunderbird.
(CVE-2009-0689)
A use-after-free flaw was found in Thunderbird. Under low memory
conditions, viewing an HTML mail message containing malicious content could
result in Thunderbird executing arbitrary code with the privileges of the
user running Thunderbird. (CVE-2009-1571)
A flaw was found in the way Thunderbird created temporary file names for
downloaded files. If a local attacker knows the name of a file Thunderbird
is going to download, they can replace the contents of that file with
arbitrary contents. (CVE-2009-3274)
A flaw was found in the way Thunderbird displayed a right-to-left override
character when downloading a file. In these cases, the name displayed in
the title bar differed from the name displayed in the dialog body. An
attacker could use this flaw to trick a user into downloading a file that
has a file name or extension that is different from what the user expected.
(CVE-2009-3376)
A flaw was found in the way Thunderbird processed SOCKS5 proxy replies. A
malicious SOCKS5 server could send a specially-crafted reply that would
cause Thunderbird to crash. (CVE-2009-2470)
Descriptions in the dialogs when adding and removing PKCS #11 modules were
not informative. An attacker able to trick a user into installing a
malicious PKCS #11 module could use this flaw to install their own
Certificate Authority certificates on a user's machine, making it possible
to trick the user into believing they are viewing trusted content or,
potentially, execute arbitrary code with the privileges of the user running
Thunderbird. (CVE-2009-3076)
All Thunderbird users should upgrade to this updated package, which
resolves these issues. All running instances of Thunderbird must be
restarted for the update to take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An updated thunderbird package that fixes several security issues is now\navailable for Red Hat Enterprise Linux 5.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "Mozilla Thunderbird is a standalone mail and newsgroup client.\n\nSeveral flaws were found in the processing of malformed HTML mail content.\nAn HTML mail message containing malicious content could cause Thunderbird\nto crash or, potentially, execute arbitrary code with the privileges of the\nuser running Thunderbird. (CVE-2009-2462, CVE-2009-2463, CVE-2009-2466,\nCVE-2009-3072, CVE-2009-3075, CVE-2009-3380, CVE-2009-3979, CVE-2010-0159)\n\nA use-after-free flaw was found in Thunderbird. An attacker could use this\nflaw to crash Thunderbird or, potentially, execute arbitrary code with the\nprivileges of the user running Thunderbird. (CVE-2009-3077)\n\nA heap-based buffer overflow flaw was found in the Thunderbird string to\nfloating point conversion routines. An HTML mail message containing\nmalicious JavaScript could crash Thunderbird or, potentially, execute\narbitrary code with the privileges of the user running Thunderbird.\n(CVE-2009-0689)\n\nA use-after-free flaw was found in Thunderbird. Under low memory\nconditions, viewing an HTML mail message containing malicious content could\nresult in Thunderbird executing arbitrary code with the privileges of the\nuser running Thunderbird. (CVE-2009-1571)\n\nA flaw was found in the way Thunderbird created temporary file names for\ndownloaded files. If a local attacker knows the name of a file Thunderbird\nis going to download, they can replace the contents of that file with\narbitrary contents. (CVE-2009-3274)\n\nA flaw was found in the way Thunderbird displayed a right-to-left override\ncharacter when downloading a file. In these cases, the name displayed in\nthe title bar differed from the name displayed in the dialog body. An\nattacker could use this flaw to trick a user into downloading a file that\nhas a file name or extension that is different from what the user expected.\n(CVE-2009-3376)\n\nA flaw was found in the way Thunderbird processed SOCKS5 proxy replies. A\nmalicious SOCKS5 server could send a specially-crafted reply that would\ncause Thunderbird to crash. (CVE-2009-2470)\n\nDescriptions in the dialogs when adding and removing PKCS #11 modules were\nnot informative. An attacker able to trick a user into installing a\nmalicious PKCS #11 module could use this flaw to install their own\nCertificate Authority certificates on a user\u0027s machine, making it possible\nto trick the user into believing they are viewing trusted content or,\npotentially, execute arbitrary code with the privileges of the user running\nThunderbird. (CVE-2009-3076)\n\nAll Thunderbird users should upgrade to this updated package, which\nresolves these issues. All running instances of Thunderbird must be\nrestarted for the update to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2010:0153", "url": "https://access.redhat.com/errata/RHSA-2010:0153" }, { "category": "external", "summary": "http://www.redhat.com/security/updates/classification/#moderate", "url": "http://www.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "512128", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512128" }, { "category": "external", "summary": "512131", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512131" }, { "category": "external", "summary": "512136", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512136" }, { "category": "external", "summary": "512145", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512145" }, { "category": "external", "summary": "521688", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=521688" }, { "category": "external", "summary": "521691", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=521691" }, { "category": "external", "summary": "521692", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=521692" }, { "category": "external", "summary": "521693", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=521693" }, { "category": "external", "summary": "524815", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=524815" }, { "category": "external", "summary": "530162", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=530162" }, { "category": "external", "summary": "530168", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=530168" }, { "category": "external", "summary": "530567", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=530567" }, { "category": "external", "summary": "546694", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=546694" }, { "category": "external", "summary": "566047", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=566047" }, { "category": "external", "summary": "566050", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=566050" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2010/rhsa-2010_0153.json" } ], "title": "Red Hat Security Advisory: thunderbird security update", "tracking": { "current_release_date": "2024-11-22T03:23:13+00:00", "generator": { "date": "2024-11-22T03:23:13+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2010:0153", "initial_release_date": "2010-03-17T12:38:00+00:00", "revision_history": [ { "date": "2010-03-17T12:38:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2010-03-17T08:38:49+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T03:23:13+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Optional Productivity Applications (v. 5 server)", "product": { "name": "Red Hat Enterprise Linux Optional Productivity Applications (v. 5 server)", "product_id": "5Server-DPAS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_productivity:5" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "thunderbird-0:2.0.0.24-2.el5_4.src", "product": { "name": "thunderbird-0:2.0.0.24-2.el5_4.src", "product_id": "thunderbird-0:2.0.0.24-2.el5_4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird@2.0.0.24-2.el5_4?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "thunderbird-0:2.0.0.24-2.el5_4.x86_64", "product": { "name": "thunderbird-0:2.0.0.24-2.el5_4.x86_64", "product_id": "thunderbird-0:2.0.0.24-2.el5_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird@2.0.0.24-2.el5_4?arch=x86_64" } } }, { "category": "product_version", "name": "thunderbird-debuginfo-0:2.0.0.24-2.el5_4.x86_64", "product": { "name": "thunderbird-debuginfo-0:2.0.0.24-2.el5_4.x86_64", "product_id": "thunderbird-debuginfo-0:2.0.0.24-2.el5_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird-debuginfo@2.0.0.24-2.el5_4?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "thunderbird-0:2.0.0.24-2.el5_4.i386", "product": { "name": "thunderbird-0:2.0.0.24-2.el5_4.i386", "product_id": "thunderbird-0:2.0.0.24-2.el5_4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird@2.0.0.24-2.el5_4?arch=i386" } } }, { "category": "product_version", "name": "thunderbird-debuginfo-0:2.0.0.24-2.el5_4.i386", "product": { "name": "thunderbird-debuginfo-0:2.0.0.24-2.el5_4.i386", "product_id": "thunderbird-debuginfo-0:2.0.0.24-2.el5_4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird-debuginfo@2.0.0.24-2.el5_4?arch=i386" } } } ], "category": "architecture", "name": "i386" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:2.0.0.24-2.el5_4.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:thunderbird-0:2.0.0.24-2.el5_4.i386" }, "product_reference": "thunderbird-0:2.0.0.24-2.el5_4.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:2.0.0.24-2.el5_4.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:thunderbird-0:2.0.0.24-2.el5_4.src" }, "product_reference": "thunderbird-0:2.0.0.24-2.el5_4.src", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:2.0.0.24-2.el5_4.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:thunderbird-0:2.0.0.24-2.el5_4.x86_64" }, "product_reference": "thunderbird-0:2.0.0.24-2.el5_4.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:2.0.0.24-2.el5_4.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.i386" }, "product_reference": "thunderbird-debuginfo-0:2.0.0.24-2.el5_4.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:2.0.0.24-2.el5_4.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.x86_64" }, "product_reference": "thunderbird-debuginfo-0:2.0.0.24-2.el5_4.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:2.0.0.24-2.el5_4.i386 as a component of Red Hat Enterprise Linux Optional Productivity Applications (v. 5 server)", "product_id": "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.i386" }, "product_reference": "thunderbird-0:2.0.0.24-2.el5_4.i386", "relates_to_product_reference": "5Server-DPAS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:2.0.0.24-2.el5_4.src as a component of Red Hat Enterprise Linux Optional Productivity Applications (v. 5 server)", "product_id": "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.src" }, "product_reference": "thunderbird-0:2.0.0.24-2.el5_4.src", "relates_to_product_reference": "5Server-DPAS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:2.0.0.24-2.el5_4.x86_64 as a component of Red Hat Enterprise Linux Optional Productivity Applications (v. 5 server)", "product_id": "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.x86_64" }, "product_reference": "thunderbird-0:2.0.0.24-2.el5_4.x86_64", "relates_to_product_reference": "5Server-DPAS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:2.0.0.24-2.el5_4.i386 as a component of Red Hat Enterprise Linux Optional Productivity Applications (v. 5 server)", "product_id": "5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.i386" }, "product_reference": "thunderbird-debuginfo-0:2.0.0.24-2.el5_4.i386", "relates_to_product_reference": "5Server-DPAS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:2.0.0.24-2.el5_4.x86_64 as a component of Red Hat Enterprise Linux Optional Productivity Applications (v. 5 server)", "product_id": "5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.x86_64" }, "product_reference": "thunderbird-debuginfo-0:2.0.0.24-2.el5_4.x86_64", "relates_to_product_reference": "5Server-DPAS" } ] }, "vulnerabilities": [ { "cve": "CVE-2009-0689", "discovery_date": "2009-11-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "539784" } ], "notes": [ { "category": "description", "text": "Array index error in the (1) dtoa implementation in dtoa.c (aka pdtoa.c) and the (2) gdtoa (aka new dtoa) implementation in gdtoa/misc.c in libc, as used in multiple operating systems and products including in FreeBSD 6.4 and 7.2, NetBSD 5.0, OpenBSD 4.5, Mozilla Firefox 3.0.x before 3.0.15 and 3.5.x before 3.5.4, K-Meleon 1.5.3, SeaMonkey 1.1.8, and other products, allows context-dependent attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a large precision value in the format argument to a printf function, which triggers incorrect memory allocation and a heap-based buffer overflow during conversion to a floating-point number.", "title": "Vulnerability description" }, { "category": "summary", "text": "array index error in dtoa implementation of many products", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client:thunderbird-0:2.0.0.24-2.el5_4.i386", "5Client:thunderbird-0:2.0.0.24-2.el5_4.src", "5Client:thunderbird-0:2.0.0.24-2.el5_4.x86_64", "5Client:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.i386", "5Client:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.x86_64", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.i386", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.src", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.x86_64", "5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.i386", "5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-0689" }, { "category": "external", "summary": "RHBZ#539784", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=539784" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-0689", "url": "https://www.cve.org/CVERecord?id=CVE-2009-0689" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-0689", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0689" } ], "release_date": "2009-11-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-03-17T12:38:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Client:thunderbird-0:2.0.0.24-2.el5_4.i386", "5Client:thunderbird-0:2.0.0.24-2.el5_4.src", "5Client:thunderbird-0:2.0.0.24-2.el5_4.x86_64", "5Client:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.i386", "5Client:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.x86_64", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.i386", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.src", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.x86_64", "5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.i386", "5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0153" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Client:thunderbird-0:2.0.0.24-2.el5_4.i386", "5Client:thunderbird-0:2.0.0.24-2.el5_4.src", "5Client:thunderbird-0:2.0.0.24-2.el5_4.x86_64", "5Client:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.i386", "5Client:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.x86_64", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.i386", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.src", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.x86_64", "5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.i386", "5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "array index error in dtoa implementation of many products" }, { "cve": "CVE-2009-1571", "discovery_date": "2010-02-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "566050" } ], "notes": [ { "category": "description", "text": "Use-after-free vulnerability in the HTML parser in Mozilla Firefox 3.0.x before 3.0.18 and 3.5.x before 3.5.8, Thunderbird before 3.0.2, and SeaMonkey before 2.0.3 allows remote attackers to execute arbitrary code via unspecified method calls that attempt to access freed objects in low-memory situations.", "title": "Vulnerability description" }, { "category": "summary", "text": "Mozilla incorrectly frees used memory (MFSA 2010-03)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client:thunderbird-0:2.0.0.24-2.el5_4.i386", "5Client:thunderbird-0:2.0.0.24-2.el5_4.src", "5Client:thunderbird-0:2.0.0.24-2.el5_4.x86_64", "5Client:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.i386", "5Client:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.x86_64", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.i386", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.src", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.x86_64", "5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.i386", "5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-1571" }, { "category": "external", "summary": "RHBZ#566050", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=566050" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1571", "url": "https://www.cve.org/CVERecord?id=CVE-2009-1571" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1571", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1571" } ], "release_date": "2010-02-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-03-17T12:38:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Client:thunderbird-0:2.0.0.24-2.el5_4.i386", "5Client:thunderbird-0:2.0.0.24-2.el5_4.src", "5Client:thunderbird-0:2.0.0.24-2.el5_4.x86_64", "5Client:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.i386", "5Client:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.x86_64", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.i386", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.src", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.x86_64", "5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.i386", "5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0153" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Client:thunderbird-0:2.0.0.24-2.el5_4.i386", "5Client:thunderbird-0:2.0.0.24-2.el5_4.src", "5Client:thunderbird-0:2.0.0.24-2.el5_4.x86_64", "5Client:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.i386", "5Client:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.x86_64", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.i386", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.src", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.x86_64", "5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.i386", "5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "Mozilla incorrectly frees used memory (MFSA 2010-03)" }, { "cve": "CVE-2009-2462", "discovery_date": "2009-07-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "512128" } ], "notes": [ { "category": "description", "text": "The browser engine in Mozilla Firefox before 3.0.12 and Thunderbird allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to (1) the frame chain and synchronous events, (2) a SetMayHaveFrame assertion and nsCSSFrameConstructor::CreateFloatingLetterFrame, (3) nsCSSFrameConstructor::ConstructFrame, (4) the child list and initial reflow, (5) GetLastSpecialSibling, (6) nsFrameManager::GetPrimaryFrameFor and MathML, (7) nsFrame::GetBoxAscent, (8) nsCSSFrameConstructor::AdjustParentFrame, (9) nsDOMOfflineResourceList, and (10) nsContentUtils::ComparePosition.", "title": "Vulnerability description" }, { "category": "summary", "text": "Mozilla Browser engine crashes", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client:thunderbird-0:2.0.0.24-2.el5_4.i386", "5Client:thunderbird-0:2.0.0.24-2.el5_4.src", "5Client:thunderbird-0:2.0.0.24-2.el5_4.x86_64", "5Client:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.i386", "5Client:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.x86_64", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.i386", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.src", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.x86_64", "5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.i386", "5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-2462" }, { "category": "external", "summary": "RHBZ#512128", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512128" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2462", "url": "https://www.cve.org/CVERecord?id=CVE-2009-2462" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2462", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2462" } ], "release_date": "2009-07-21T23:56:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-03-17T12:38:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Client:thunderbird-0:2.0.0.24-2.el5_4.i386", "5Client:thunderbird-0:2.0.0.24-2.el5_4.src", "5Client:thunderbird-0:2.0.0.24-2.el5_4.x86_64", "5Client:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.i386", "5Client:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.x86_64", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.i386", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.src", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.x86_64", "5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.i386", "5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0153" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Client:thunderbird-0:2.0.0.24-2.el5_4.i386", "5Client:thunderbird-0:2.0.0.24-2.el5_4.src", "5Client:thunderbird-0:2.0.0.24-2.el5_4.x86_64", "5Client:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.i386", "5Client:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.x86_64", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.i386", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.src", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.x86_64", "5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.i386", "5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "Mozilla Browser engine crashes" }, { "cve": "CVE-2009-2463", "discovery_date": "2009-07-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "512131" } ], "notes": [ { "category": "description", "text": "Multiple integer overflows in the (1) PL_Base64Decode and (2) PL_Base64Encode functions in nsprpub/lib/libc/src/base64.c in Mozilla Firefox before 3.0.12, Thunderbird before 2.0.0.24, and SeaMonkey before 1.1.19 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unspecified vectors that trigger buffer overflows.", "title": "Vulnerability description" }, { "category": "summary", "text": "Mozilla Base64 decoding crash", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client:thunderbird-0:2.0.0.24-2.el5_4.i386", "5Client:thunderbird-0:2.0.0.24-2.el5_4.src", "5Client:thunderbird-0:2.0.0.24-2.el5_4.x86_64", "5Client:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.i386", "5Client:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.x86_64", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.i386", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.src", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.x86_64", "5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.i386", "5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-2463" }, { "category": "external", "summary": "RHBZ#512131", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512131" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2463", "url": "https://www.cve.org/CVERecord?id=CVE-2009-2463" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2463", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2463" } ], "release_date": "2009-07-21T23:56:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-03-17T12:38:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Client:thunderbird-0:2.0.0.24-2.el5_4.i386", "5Client:thunderbird-0:2.0.0.24-2.el5_4.src", "5Client:thunderbird-0:2.0.0.24-2.el5_4.x86_64", "5Client:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.i386", "5Client:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.x86_64", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.i386", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.src", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.x86_64", "5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.i386", "5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0153" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Client:thunderbird-0:2.0.0.24-2.el5_4.i386", "5Client:thunderbird-0:2.0.0.24-2.el5_4.src", "5Client:thunderbird-0:2.0.0.24-2.el5_4.x86_64", "5Client:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.i386", "5Client:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.x86_64", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.i386", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.src", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.x86_64", "5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.i386", "5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "Mozilla Base64 decoding crash" }, { "cve": "CVE-2009-2466", "discovery_date": "2009-07-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "512136" } ], "notes": [ { "category": "description", "text": "The JavaScript engine in Mozilla Firefox before 3.0.12 and Thunderbird allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to (1) nsDOMClassInfo.cpp, (2) JS_HashTableRawLookup, and (3) MirrorWrappedNativeParent and js_LockGCThingRT.", "title": "Vulnerability description" }, { "category": "summary", "text": "Mozilla JavaScript engine crashes", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client:thunderbird-0:2.0.0.24-2.el5_4.i386", "5Client:thunderbird-0:2.0.0.24-2.el5_4.src", "5Client:thunderbird-0:2.0.0.24-2.el5_4.x86_64", "5Client:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.i386", "5Client:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.x86_64", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.i386", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.src", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.x86_64", "5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.i386", "5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-2466" }, { "category": "external", "summary": "RHBZ#512136", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512136" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2466", "url": "https://www.cve.org/CVERecord?id=CVE-2009-2466" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2466", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2466" } ], "release_date": "2009-07-21T23:56:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-03-17T12:38:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Client:thunderbird-0:2.0.0.24-2.el5_4.i386", "5Client:thunderbird-0:2.0.0.24-2.el5_4.src", "5Client:thunderbird-0:2.0.0.24-2.el5_4.x86_64", "5Client:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.i386", "5Client:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.x86_64", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.i386", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.src", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.x86_64", "5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.i386", "5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0153" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Client:thunderbird-0:2.0.0.24-2.el5_4.i386", "5Client:thunderbird-0:2.0.0.24-2.el5_4.src", "5Client:thunderbird-0:2.0.0.24-2.el5_4.x86_64", "5Client:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.i386", "5Client:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.x86_64", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.i386", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.src", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.x86_64", "5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.i386", "5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "Mozilla JavaScript engine crashes" }, { "cve": "CVE-2009-2470", "discovery_date": "2009-07-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "512145" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox before 3.0.12, and 3.5.x before 3.5.2, allows remote SOCKS5 proxy servers to cause a denial of service (data stream corruption) via a long domain name in a reply.", "title": "Vulnerability description" }, { "category": "summary", "text": "Mozilla data corruption with SOCKS5 reply", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client:thunderbird-0:2.0.0.24-2.el5_4.i386", "5Client:thunderbird-0:2.0.0.24-2.el5_4.src", "5Client:thunderbird-0:2.0.0.24-2.el5_4.x86_64", "5Client:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.i386", "5Client:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.x86_64", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.i386", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.src", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.x86_64", "5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.i386", "5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-2470" }, { "category": "external", "summary": "RHBZ#512145", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512145" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2470", "url": "https://www.cve.org/CVERecord?id=CVE-2009-2470" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2470", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2470" } ], "release_date": "2009-07-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-03-17T12:38:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Client:thunderbird-0:2.0.0.24-2.el5_4.i386", "5Client:thunderbird-0:2.0.0.24-2.el5_4.src", "5Client:thunderbird-0:2.0.0.24-2.el5_4.x86_64", "5Client:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.i386", "5Client:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.x86_64", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.i386", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.src", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.x86_64", "5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.i386", "5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0153" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "5Client:thunderbird-0:2.0.0.24-2.el5_4.i386", "5Client:thunderbird-0:2.0.0.24-2.el5_4.src", "5Client:thunderbird-0:2.0.0.24-2.el5_4.x86_64", "5Client:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.i386", "5Client:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.x86_64", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.i386", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.src", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.x86_64", "5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.i386", "5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "Mozilla data corruption with SOCKS5 reply" }, { "cve": "CVE-2009-3072", "discovery_date": "2009-09-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "521688" } ], "notes": [ { "category": "description", "text": "Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.0.14 and 3.5.x before 3.5.3, Thunderbird before 2.0.0.24, and SeaMonkey before 1.1.19 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to the BinHex decoder in netwerk/streamconv/converters/nsBinHexDecoder.cpp, and unknown vectors.", "title": "Vulnerability description" }, { "category": "summary", "text": "Firefox 3.5.3 3.0.14 browser engine crashes", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client:thunderbird-0:2.0.0.24-2.el5_4.i386", "5Client:thunderbird-0:2.0.0.24-2.el5_4.src", "5Client:thunderbird-0:2.0.0.24-2.el5_4.x86_64", "5Client:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.i386", "5Client:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.x86_64", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.i386", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.src", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.x86_64", "5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.i386", "5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-3072" }, { "category": "external", "summary": "RHBZ#521688", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=521688" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3072", "url": "https://www.cve.org/CVERecord?id=CVE-2009-3072" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3072", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3072" } ], "release_date": "2009-09-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-03-17T12:38:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Client:thunderbird-0:2.0.0.24-2.el5_4.i386", "5Client:thunderbird-0:2.0.0.24-2.el5_4.src", "5Client:thunderbird-0:2.0.0.24-2.el5_4.x86_64", "5Client:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.i386", "5Client:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.x86_64", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.i386", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.src", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.x86_64", "5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.i386", "5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0153" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Client:thunderbird-0:2.0.0.24-2.el5_4.i386", "5Client:thunderbird-0:2.0.0.24-2.el5_4.src", "5Client:thunderbird-0:2.0.0.24-2.el5_4.x86_64", "5Client:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.i386", "5Client:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.x86_64", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.i386", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.src", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.x86_64", "5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.i386", "5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "Firefox 3.5.3 3.0.14 browser engine crashes" }, { "cve": "CVE-2009-3075", "discovery_date": "2009-09-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "521691" } ], "notes": [ { "category": "description", "text": "Multiple unspecified vulnerabilities in the JavaScript engine in Mozilla Firefox before 3.0.14 and 3.5.x before 3.5.2, Thunderbird before 2.0.0.24, and SeaMonkey before 1.1.19 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to use of mutable strings in the js_StringReplaceHelper function in js/src/jsstr.cpp, and unknown vectors.", "title": "Vulnerability description" }, { "category": "summary", "text": "Firefox 3.5.2 3.0.14 JavaScript engine crashes", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client:thunderbird-0:2.0.0.24-2.el5_4.i386", "5Client:thunderbird-0:2.0.0.24-2.el5_4.src", "5Client:thunderbird-0:2.0.0.24-2.el5_4.x86_64", "5Client:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.i386", "5Client:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.x86_64", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.i386", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.src", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.x86_64", "5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.i386", "5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-3075" }, { "category": "external", "summary": "RHBZ#521691", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=521691" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3075", "url": "https://www.cve.org/CVERecord?id=CVE-2009-3075" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3075", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3075" } ], "release_date": "2009-09-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-03-17T12:38:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Client:thunderbird-0:2.0.0.24-2.el5_4.i386", "5Client:thunderbird-0:2.0.0.24-2.el5_4.src", "5Client:thunderbird-0:2.0.0.24-2.el5_4.x86_64", "5Client:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.i386", "5Client:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.x86_64", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.i386", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.src", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.x86_64", "5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.i386", "5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0153" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Client:thunderbird-0:2.0.0.24-2.el5_4.i386", "5Client:thunderbird-0:2.0.0.24-2.el5_4.src", "5Client:thunderbird-0:2.0.0.24-2.el5_4.x86_64", "5Client:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.i386", "5Client:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.x86_64", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.i386", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.src", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.x86_64", "5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.i386", "5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "Firefox 3.5.2 3.0.14 JavaScript engine crashes" }, { "cve": "CVE-2009-3076", "discovery_date": "2009-09-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "521692" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox before 3.0.14 does not properly implement certain dialogs associated with the (1) pkcs11.addmodule and (2) pkcs11.deletemodule operations, which makes it easier for remote attackers to trick a user into installing or removing an arbitrary PKCS11 module.", "title": "Vulnerability description" }, { "category": "summary", "text": "Firefox 3.0.14 Insufficient warning for PKCS11 module installation and removal", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client:thunderbird-0:2.0.0.24-2.el5_4.i386", "5Client:thunderbird-0:2.0.0.24-2.el5_4.src", "5Client:thunderbird-0:2.0.0.24-2.el5_4.x86_64", "5Client:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.i386", "5Client:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.x86_64", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.i386", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.src", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.x86_64", "5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.i386", "5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-3076" }, { "category": "external", "summary": "RHBZ#521692", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=521692" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3076", "url": "https://www.cve.org/CVERecord?id=CVE-2009-3076" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3076", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3076" } ], "release_date": "2009-09-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-03-17T12:38:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Client:thunderbird-0:2.0.0.24-2.el5_4.i386", "5Client:thunderbird-0:2.0.0.24-2.el5_4.src", "5Client:thunderbird-0:2.0.0.24-2.el5_4.x86_64", "5Client:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.i386", "5Client:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.x86_64", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.i386", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.src", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.x86_64", "5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.i386", "5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0153" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "5Client:thunderbird-0:2.0.0.24-2.el5_4.i386", "5Client:thunderbird-0:2.0.0.24-2.el5_4.src", "5Client:thunderbird-0:2.0.0.24-2.el5_4.x86_64", "5Client:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.i386", "5Client:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.x86_64", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.i386", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.src", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.x86_64", "5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.i386", "5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Firefox 3.0.14 Insufficient warning for PKCS11 module installation and removal" }, { "cve": "CVE-2009-3077", "discovery_date": "2009-09-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "521693" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox before 3.0.14, and 3.5.x before 3.5.3, does not properly manage pointers for the columns (aka TreeColumns) of a XUL tree element, which allows remote attackers to execute arbitrary code via a crafted HTML document, related to a \"dangling pointer vulnerability.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "Firefox 3.5.3 3.0.14 TreeColumns dangling pointer vulnerability", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client:thunderbird-0:2.0.0.24-2.el5_4.i386", "5Client:thunderbird-0:2.0.0.24-2.el5_4.src", "5Client:thunderbird-0:2.0.0.24-2.el5_4.x86_64", "5Client:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.i386", "5Client:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.x86_64", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.i386", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.src", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.x86_64", "5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.i386", "5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-3077" }, { "category": "external", "summary": "RHBZ#521693", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=521693" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3077", "url": "https://www.cve.org/CVERecord?id=CVE-2009-3077" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3077", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3077" } ], "release_date": "2009-09-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-03-17T12:38:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Client:thunderbird-0:2.0.0.24-2.el5_4.i386", "5Client:thunderbird-0:2.0.0.24-2.el5_4.src", "5Client:thunderbird-0:2.0.0.24-2.el5_4.x86_64", "5Client:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.i386", "5Client:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.x86_64", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.i386", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.src", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.x86_64", "5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.i386", "5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0153" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Client:thunderbird-0:2.0.0.24-2.el5_4.i386", "5Client:thunderbird-0:2.0.0.24-2.el5_4.src", "5Client:thunderbird-0:2.0.0.24-2.el5_4.x86_64", "5Client:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.i386", "5Client:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.x86_64", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.i386", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.src", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.x86_64", "5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.i386", "5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "Firefox 3.5.3 3.0.14 TreeColumns dangling pointer vulnerability" }, { "cve": "CVE-2009-3274", "discovery_date": "2009-09-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "524815" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox 3.6a1, 3.5.3, 3.5.2, and earlier 3.5.x versions, and 3.0.14 and earlier 2.x and 3.x versions, on Linux uses a predictable /tmp pathname for files selected from the Downloads window, which allows local users to replace an arbitrary downloaded file by placing a file in a /tmp location before the download occurs, related to the Download Manager component. NOTE: some of these details are obtained from third party information.", "title": "Vulnerability description" }, { "category": "summary", "text": "Firefox: Predictable /tmp pathname use", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client:thunderbird-0:2.0.0.24-2.el5_4.i386", "5Client:thunderbird-0:2.0.0.24-2.el5_4.src", "5Client:thunderbird-0:2.0.0.24-2.el5_4.x86_64", "5Client:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.i386", "5Client:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.x86_64", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.i386", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.src", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.x86_64", "5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.i386", "5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-3274" }, { "category": "external", "summary": "RHBZ#524815", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=524815" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3274", "url": "https://www.cve.org/CVERecord?id=CVE-2009-3274" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3274", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3274" } ], "release_date": "2009-09-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-03-17T12:38:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Client:thunderbird-0:2.0.0.24-2.el5_4.i386", "5Client:thunderbird-0:2.0.0.24-2.el5_4.src", "5Client:thunderbird-0:2.0.0.24-2.el5_4.x86_64", "5Client:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.i386", "5Client:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.x86_64", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.i386", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.src", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.x86_64", "5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.i386", "5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0153" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 3.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, "products": [ "5Client:thunderbird-0:2.0.0.24-2.el5_4.i386", "5Client:thunderbird-0:2.0.0.24-2.el5_4.src", "5Client:thunderbird-0:2.0.0.24-2.el5_4.x86_64", "5Client:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.i386", "5Client:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.x86_64", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.i386", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.src", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.x86_64", "5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.i386", "5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Firefox: Predictable /tmp pathname use" }, { "cve": "CVE-2009-3376", "discovery_date": "2009-10-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "530168" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox before 3.0.15 and 3.5.x before 3.5.4, and SeaMonkey before 2.0, does not properly handle a right-to-left override (aka RLO or U+202E) Unicode character in a download filename, which allows remote attackers to spoof file extensions via a crafted filename, as demonstrated by displaying a non-executable extension for an executable file.", "title": "Vulnerability description" }, { "category": "summary", "text": "Firefox download filename spoofing with RTL override", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client:thunderbird-0:2.0.0.24-2.el5_4.i386", "5Client:thunderbird-0:2.0.0.24-2.el5_4.src", "5Client:thunderbird-0:2.0.0.24-2.el5_4.x86_64", "5Client:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.i386", "5Client:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.x86_64", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.i386", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.src", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.x86_64", "5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.i386", "5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-3376" }, { "category": "external", "summary": "RHBZ#530168", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=530168" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3376", "url": "https://www.cve.org/CVERecord?id=CVE-2009-3376" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3376", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3376" } ], "release_date": "2009-10-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-03-17T12:38:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Client:thunderbird-0:2.0.0.24-2.el5_4.i386", "5Client:thunderbird-0:2.0.0.24-2.el5_4.src", "5Client:thunderbird-0:2.0.0.24-2.el5_4.x86_64", "5Client:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.i386", "5Client:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.x86_64", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.i386", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.src", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.x86_64", "5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.i386", "5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0153" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.6, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "5Client:thunderbird-0:2.0.0.24-2.el5_4.i386", "5Client:thunderbird-0:2.0.0.24-2.el5_4.src", "5Client:thunderbird-0:2.0.0.24-2.el5_4.x86_64", "5Client:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.i386", "5Client:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.x86_64", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.i386", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.src", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.x86_64", "5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.i386", "5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "Firefox download filename spoofing with RTL override" }, { "cve": "CVE-2009-3380", "discovery_date": "2009-10-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "530567" } ], "notes": [ { "category": "description", "text": "Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 3.0.x before 3.0.15 and 3.5.x before 3.5.4 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.", "title": "Vulnerability description" }, { "category": "summary", "text": "Firefox crashes with evidence of memory corruption", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client:thunderbird-0:2.0.0.24-2.el5_4.i386", "5Client:thunderbird-0:2.0.0.24-2.el5_4.src", "5Client:thunderbird-0:2.0.0.24-2.el5_4.x86_64", "5Client:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.i386", "5Client:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.x86_64", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.i386", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.src", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.x86_64", "5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.i386", "5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-3380" }, { "category": "external", "summary": "RHBZ#530567", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=530567" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3380", "url": "https://www.cve.org/CVERecord?id=CVE-2009-3380" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3380", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3380" } ], "release_date": "2009-10-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-03-17T12:38:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Client:thunderbird-0:2.0.0.24-2.el5_4.i386", "5Client:thunderbird-0:2.0.0.24-2.el5_4.src", "5Client:thunderbird-0:2.0.0.24-2.el5_4.x86_64", "5Client:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.i386", "5Client:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.x86_64", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.i386", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.src", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.x86_64", "5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.i386", "5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0153" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Client:thunderbird-0:2.0.0.24-2.el5_4.i386", "5Client:thunderbird-0:2.0.0.24-2.el5_4.src", "5Client:thunderbird-0:2.0.0.24-2.el5_4.x86_64", "5Client:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.i386", "5Client:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.x86_64", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.i386", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.src", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.x86_64", "5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.i386", "5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "Firefox crashes with evidence of memory corruption" }, { "cve": "CVE-2009-3384", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2009-10-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "530164" } ], "notes": [ { "category": "description", "text": "Multiple unspecified vulnerabilities in WebKit in Apple Safari before 4.0.4 on Windows allow remote FTP servers to execute arbitrary code, cause a denial of service (application crash), or obtain sensitive information via a crafted directory listing in a reply.", "title": "Vulnerability description" }, { "category": "summary", "text": "Firefox integer underflow in FTP directory list parser", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client:thunderbird-0:2.0.0.24-2.el5_4.i386", "5Client:thunderbird-0:2.0.0.24-2.el5_4.src", "5Client:thunderbird-0:2.0.0.24-2.el5_4.x86_64", "5Client:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.i386", "5Client:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.x86_64", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.i386", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.src", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.x86_64", "5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.i386", "5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-3384" }, { "category": "external", "summary": "RHBZ#530164", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=530164" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3384", "url": "https://www.cve.org/CVERecord?id=CVE-2009-3384" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3384", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3384" } ], "release_date": "2009-10-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-03-17T12:38:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Client:thunderbird-0:2.0.0.24-2.el5_4.i386", "5Client:thunderbird-0:2.0.0.24-2.el5_4.src", "5Client:thunderbird-0:2.0.0.24-2.el5_4.x86_64", "5Client:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.i386", "5Client:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.x86_64", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.i386", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.src", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.x86_64", "5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.i386", "5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0153" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Client:thunderbird-0:2.0.0.24-2.el5_4.i386", "5Client:thunderbird-0:2.0.0.24-2.el5_4.src", "5Client:thunderbird-0:2.0.0.24-2.el5_4.x86_64", "5Client:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.i386", "5Client:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.x86_64", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.i386", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.src", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.x86_64", "5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.i386", "5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "Firefox integer underflow in FTP directory list parser" }, { "cve": "CVE-2009-3979", "discovery_date": "2009-12-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "546694" } ], "notes": [ { "category": "description", "text": "Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.0.16 and 3.5.x before 3.5.6, SeaMonkey before 2.0.1, and Thunderbird allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.", "title": "Vulnerability description" }, { "category": "summary", "text": "Mozilla crash with evidence of memory corruption", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client:thunderbird-0:2.0.0.24-2.el5_4.i386", "5Client:thunderbird-0:2.0.0.24-2.el5_4.src", "5Client:thunderbird-0:2.0.0.24-2.el5_4.x86_64", "5Client:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.i386", "5Client:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.x86_64", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.i386", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.src", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.x86_64", "5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.i386", "5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-3979" }, { "category": "external", "summary": "RHBZ#546694", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=546694" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3979", "url": "https://www.cve.org/CVERecord?id=CVE-2009-3979" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3979", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3979" } ], "release_date": "2009-12-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-03-17T12:38:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Client:thunderbird-0:2.0.0.24-2.el5_4.i386", "5Client:thunderbird-0:2.0.0.24-2.el5_4.src", "5Client:thunderbird-0:2.0.0.24-2.el5_4.x86_64", "5Client:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.i386", "5Client:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.x86_64", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.i386", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.src", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.x86_64", "5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.i386", "5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0153" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Client:thunderbird-0:2.0.0.24-2.el5_4.i386", "5Client:thunderbird-0:2.0.0.24-2.el5_4.src", "5Client:thunderbird-0:2.0.0.24-2.el5_4.x86_64", "5Client:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.i386", "5Client:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.x86_64", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.i386", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.src", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.x86_64", "5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.i386", "5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "Mozilla crash with evidence of memory corruption" }, { "cve": "CVE-2010-0159", "discovery_date": "2010-02-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "566047" } ], "notes": [ { "category": "description", "text": "The browser engine in Mozilla Firefox 3.0.x before 3.0.18 and 3.5.x before 3.5.8, Thunderbird before 3.0.2, and SeaMonkey before 2.0.3 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to the nsBlockFrame::StealFrame function in layout/generic/nsBlockFrame.cpp, and unspecified other vectors.", "title": "Vulnerability description" }, { "category": "summary", "text": "Mozilla crashes with evidence of memory corruption (MFSA 2010-01)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client:thunderbird-0:2.0.0.24-2.el5_4.i386", "5Client:thunderbird-0:2.0.0.24-2.el5_4.src", "5Client:thunderbird-0:2.0.0.24-2.el5_4.x86_64", "5Client:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.i386", "5Client:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.x86_64", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.i386", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.src", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.x86_64", "5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.i386", "5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-0159" }, { "category": "external", "summary": "RHBZ#566047", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=566047" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-0159", "url": "https://www.cve.org/CVERecord?id=CVE-2010-0159" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-0159", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-0159" } ], "release_date": "2010-02-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-03-17T12:38:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Client:thunderbird-0:2.0.0.24-2.el5_4.i386", "5Client:thunderbird-0:2.0.0.24-2.el5_4.src", "5Client:thunderbird-0:2.0.0.24-2.el5_4.x86_64", "5Client:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.i386", "5Client:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.x86_64", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.i386", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.src", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.x86_64", "5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.i386", "5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0153" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Client:thunderbird-0:2.0.0.24-2.el5_4.i386", "5Client:thunderbird-0:2.0.0.24-2.el5_4.src", "5Client:thunderbird-0:2.0.0.24-2.el5_4.x86_64", "5Client:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.i386", "5Client:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.x86_64", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.i386", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.src", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.x86_64", "5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.i386", "5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "Mozilla crashes with evidence of memory corruption (MFSA 2010-01)" }, { "cve": "CVE-2010-0163", "discovery_date": "2010-03-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "576391" } ], "notes": [ { "category": "description", "text": "Mozilla Thunderbird before 2.0.0.24 and SeaMonkey before 1.1.19 process e-mail attachments with a parser that performs casts and line termination incorrectly, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted message, related to message indexing.", "title": "Vulnerability description" }, { "category": "summary", "text": "seamonkey/thunderbird: crash when indexing certain messages with attachments", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client:thunderbird-0:2.0.0.24-2.el5_4.i386", "5Client:thunderbird-0:2.0.0.24-2.el5_4.src", "5Client:thunderbird-0:2.0.0.24-2.el5_4.x86_64", "5Client:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.i386", "5Client:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.x86_64", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.i386", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.src", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.x86_64", "5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.i386", "5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-0163" }, { "category": "external", "summary": "RHBZ#576391", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=576391" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-0163", "url": "https://www.cve.org/CVERecord?id=CVE-2010-0163" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-0163", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-0163" } ], "release_date": "2010-03-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-03-17T12:38:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Client:thunderbird-0:2.0.0.24-2.el5_4.i386", "5Client:thunderbird-0:2.0.0.24-2.el5_4.src", "5Client:thunderbird-0:2.0.0.24-2.el5_4.x86_64", "5Client:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.i386", "5Client:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.x86_64", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.i386", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.src", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.x86_64", "5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.i386", "5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0153" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Client:thunderbird-0:2.0.0.24-2.el5_4.i386", "5Client:thunderbird-0:2.0.0.24-2.el5_4.src", "5Client:thunderbird-0:2.0.0.24-2.el5_4.x86_64", "5Client:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.i386", "5Client:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.x86_64", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.i386", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.src", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.x86_64", "5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.i386", "5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "seamonkey/thunderbird: crash when indexing certain messages with attachments" }, { "cve": "CVE-2010-0169", "discovery_date": "2010-03-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "576694" } ], "notes": [ { "category": "description", "text": "The CSSLoaderImpl::DoSheetComplete function in layout/style/nsCSSLoader.cpp in Mozilla Firefox 3.0.x before 3.0.18, 3.5.x before 3.5.8, and 3.6.x before 3.6.2; Thunderbird before 3.0.2; and SeaMonkey before 2.0.3 changes the case of certain strings in a stylesheet before adding this stylesheet to the XUL cache, which might allow remote attackers to modify the browser\u0027s font and other CSS attributes, and potentially disrupt rendering of a web page, by forcing the browser to perform this erroneous stylesheet caching.", "title": "Vulnerability description" }, { "category": "summary", "text": "firefox/thunderbird/seamonkey: browser chrome defacement via cached XUL stylesheets (MFSA 2010-14)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client:thunderbird-0:2.0.0.24-2.el5_4.i386", "5Client:thunderbird-0:2.0.0.24-2.el5_4.src", "5Client:thunderbird-0:2.0.0.24-2.el5_4.x86_64", "5Client:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.i386", "5Client:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.x86_64", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.i386", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.src", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.x86_64", "5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.i386", "5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-0169" }, { "category": "external", "summary": "RHBZ#576694", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=576694" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-0169", "url": "https://www.cve.org/CVERecord?id=CVE-2010-0169" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-0169", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-0169" } ], "release_date": "2010-03-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-03-17T12:38:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Client:thunderbird-0:2.0.0.24-2.el5_4.i386", "5Client:thunderbird-0:2.0.0.24-2.el5_4.src", "5Client:thunderbird-0:2.0.0.24-2.el5_4.x86_64", "5Client:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.i386", "5Client:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.x86_64", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.i386", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.src", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.x86_64", "5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.i386", "5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0153" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "5Client:thunderbird-0:2.0.0.24-2.el5_4.i386", "5Client:thunderbird-0:2.0.0.24-2.el5_4.src", "5Client:thunderbird-0:2.0.0.24-2.el5_4.x86_64", "5Client:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.i386", "5Client:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.x86_64", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.i386", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.src", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.x86_64", "5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.i386", "5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "firefox/thunderbird/seamonkey: browser chrome defacement via cached XUL stylesheets (MFSA 2010-14)" }, { "cve": "CVE-2010-0171", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2010-03-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "576696" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox 3.0.x before 3.0.18, 3.5.x before 3.5.8, and 3.6.x before 3.6.2; Thunderbird before 3.0.2; and SeaMonkey before 2.0.3 allow remote attackers to perform cross-origin keystroke capture, and possibly conduct cross-site scripting (XSS) attacks, by using the addEventListener and setTimeout functions in conjunction with a wrapped object. NOTE: this vulnerability exists because of an incomplete fix for CVE-2007-3736.", "title": "Vulnerability description" }, { "category": "summary", "text": "firefox/thunderbird/seamonkey: XSS using addEventListener and setTimeout on a wrapped object (MFSA 2010-12)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client:thunderbird-0:2.0.0.24-2.el5_4.i386", "5Client:thunderbird-0:2.0.0.24-2.el5_4.src", "5Client:thunderbird-0:2.0.0.24-2.el5_4.x86_64", "5Client:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.i386", "5Client:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.x86_64", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.i386", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.src", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.x86_64", "5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.i386", "5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-0171" }, { "category": "external", "summary": "RHBZ#576696", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=576696" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-0171", "url": "https://www.cve.org/CVERecord?id=CVE-2010-0171" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-0171", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-0171" } ], "release_date": "2010-03-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-03-17T12:38:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Client:thunderbird-0:2.0.0.24-2.el5_4.i386", "5Client:thunderbird-0:2.0.0.24-2.el5_4.src", "5Client:thunderbird-0:2.0.0.24-2.el5_4.x86_64", "5Client:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.i386", "5Client:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.x86_64", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.i386", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.src", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.x86_64", "5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.i386", "5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0153" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "5Client:thunderbird-0:2.0.0.24-2.el5_4.i386", "5Client:thunderbird-0:2.0.0.24-2.el5_4.src", "5Client:thunderbird-0:2.0.0.24-2.el5_4.x86_64", "5Client:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.i386", "5Client:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.x86_64", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.i386", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.src", "5Server-DPAS:thunderbird-0:2.0.0.24-2.el5_4.x86_64", "5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.i386", "5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-2.el5_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "firefox/thunderbird/seamonkey: XSS using addEventListener and setTimeout on a wrapped object (MFSA 2010-12)" } ] }
rhsa-2010_0154
Vulnerability from csaf_redhat
Published
2010-03-17 13:04
Modified
2024-11-22 03:23
Summary
Red Hat Security Advisory: thunderbird security update
Notes
Topic
An updated thunderbird package that fixes several security issues is now
available for Red Hat Enterprise Linux 4.
The Red Hat Security Response Team has rated this update as having moderate
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each vulnerability
from the CVE links in the References section.
Details
Mozilla Thunderbird is a standalone mail and newsgroup client.
Several flaws were found in the processing of malformed HTML mail content.
An HTML mail message containing malicious content could cause Thunderbird
to crash or, potentially, execute arbitrary code with the privileges of the
user running Thunderbird. (CVE-2009-2462, CVE-2009-2463, CVE-2009-2466,
CVE-2009-3072, CVE-2009-3075, CVE-2009-3380, CVE-2009-3979, CVE-2010-0159)
A use-after-free flaw was found in Thunderbird. An attacker could use this
flaw to crash Thunderbird or, potentially, execute arbitrary code with the
privileges of the user running Thunderbird. (CVE-2009-3077)
A heap-based buffer overflow flaw was found in the Thunderbird string to
floating point conversion routines. An HTML mail message containing
malicious JavaScript could crash Thunderbird or, potentially, execute
arbitrary code with the privileges of the user running Thunderbird.
(CVE-2009-0689)
A use-after-free flaw was found in Thunderbird. Under low memory
conditions, viewing an HTML mail message containing malicious content could
result in Thunderbird executing arbitrary code with the privileges of the
user running Thunderbird. (CVE-2009-1571)
A flaw was found in the way Thunderbird created temporary file names for
downloaded files. If a local attacker knows the name of a file Thunderbird
is going to download, they can replace the contents of that file with
arbitrary contents. (CVE-2009-3274)
A flaw was found in the way Thunderbird displayed a right-to-left override
character when downloading a file. In these cases, the name displayed in
the title bar differed from the name displayed in the dialog body. An
attacker could use this flaw to trick a user into downloading a file that
has a file name or extension that is different from what the user expected.
(CVE-2009-3376)
A flaw was found in the way Thunderbird processed SOCKS5 proxy replies. A
malicious SOCKS5 server could send a specially-crafted reply that would
cause Thunderbird to crash. (CVE-2009-2470)
Descriptions in the dialogs when adding and removing PKCS #11 modules were
not informative. An attacker able to trick a user into installing a
malicious PKCS #11 module could use this flaw to install their own
Certificate Authority certificates on a user's machine, making it possible
to trick the user into believing they are viewing trusted content or,
potentially, execute arbitrary code with the privileges of the user running
Thunderbird. (CVE-2009-3076)
All Thunderbird users should upgrade to this updated package, which
resolves these issues. All running instances of Thunderbird must be
restarted for the update to take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An updated thunderbird package that fixes several security issues is now\navailable for Red Hat Enterprise Linux 4.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "Mozilla Thunderbird is a standalone mail and newsgroup client.\n\nSeveral flaws were found in the processing of malformed HTML mail content.\nAn HTML mail message containing malicious content could cause Thunderbird\nto crash or, potentially, execute arbitrary code with the privileges of the\nuser running Thunderbird. (CVE-2009-2462, CVE-2009-2463, CVE-2009-2466,\nCVE-2009-3072, CVE-2009-3075, CVE-2009-3380, CVE-2009-3979, CVE-2010-0159)\n\nA use-after-free flaw was found in Thunderbird. An attacker could use this\nflaw to crash Thunderbird or, potentially, execute arbitrary code with the\nprivileges of the user running Thunderbird. (CVE-2009-3077)\n\nA heap-based buffer overflow flaw was found in the Thunderbird string to\nfloating point conversion routines. An HTML mail message containing\nmalicious JavaScript could crash Thunderbird or, potentially, execute\narbitrary code with the privileges of the user running Thunderbird.\n(CVE-2009-0689)\n\nA use-after-free flaw was found in Thunderbird. Under low memory\nconditions, viewing an HTML mail message containing malicious content could\nresult in Thunderbird executing arbitrary code with the privileges of the\nuser running Thunderbird. (CVE-2009-1571)\n\nA flaw was found in the way Thunderbird created temporary file names for\ndownloaded files. If a local attacker knows the name of a file Thunderbird\nis going to download, they can replace the contents of that file with\narbitrary contents. (CVE-2009-3274)\n\nA flaw was found in the way Thunderbird displayed a right-to-left override\ncharacter when downloading a file. In these cases, the name displayed in\nthe title bar differed from the name displayed in the dialog body. An\nattacker could use this flaw to trick a user into downloading a file that\nhas a file name or extension that is different from what the user expected.\n(CVE-2009-3376)\n\nA flaw was found in the way Thunderbird processed SOCKS5 proxy replies. A\nmalicious SOCKS5 server could send a specially-crafted reply that would\ncause Thunderbird to crash. (CVE-2009-2470)\n\nDescriptions in the dialogs when adding and removing PKCS #11 modules were\nnot informative. An attacker able to trick a user into installing a\nmalicious PKCS #11 module could use this flaw to install their own\nCertificate Authority certificates on a user\u0027s machine, making it possible\nto trick the user into believing they are viewing trusted content or,\npotentially, execute arbitrary code with the privileges of the user running\nThunderbird. (CVE-2009-3076)\n\nAll Thunderbird users should upgrade to this updated package, which\nresolves these issues. All running instances of Thunderbird must be\nrestarted for the update to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2010:0154", "url": "https://access.redhat.com/errata/RHSA-2010:0154" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "512128", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512128" }, { "category": "external", "summary": "512131", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512131" }, { "category": "external", "summary": "512136", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512136" }, { "category": "external", "summary": "512145", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512145" }, { "category": "external", "summary": "521688", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=521688" }, { "category": "external", "summary": "521691", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=521691" }, { "category": "external", "summary": "521692", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=521692" }, { "category": "external", "summary": "521693", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=521693" }, { "category": "external", "summary": "524815", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=524815" }, { "category": "external", "summary": "530162", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=530162" }, { "category": "external", "summary": "530168", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=530168" }, { "category": "external", "summary": "530567", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=530567" }, { "category": "external", "summary": "546694", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=546694" }, { "category": "external", "summary": "566047", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=566047" }, { "category": "external", "summary": "566050", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=566050" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2010/rhsa-2010_0154.json" } ], "title": "Red Hat Security Advisory: thunderbird security update", "tracking": { "current_release_date": "2024-11-22T03:23:17+00:00", "generator": { "date": "2024-11-22T03:23:17+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2010:0154", "initial_release_date": "2010-03-17T13:04:00+00:00", "revision_history": [ { "date": "2010-03-17T13:04:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2010-03-17T09:22:56+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T03:23:17+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 4", "product": { "name": "Red Hat Enterprise Linux AS version 4", "product_id": "4AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::as" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop version 4", "product": { "name": "Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 4", "product": { "name": "Red Hat Enterprise Linux ES version 4", "product_id": "4ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 4", "product": { "name": "Red Hat Enterprise Linux WS version 4", "product_id": "4WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::ws" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "thunderbird-0:1.5.0.12-25.el4.ia64", "product": { "name": "thunderbird-0:1.5.0.12-25.el4.ia64", "product_id": "thunderbird-0:1.5.0.12-25.el4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird@1.5.0.12-25.el4?arch=ia64" } } }, { "category": "product_version", "name": "thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "product": { "name": "thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "product_id": "thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird-debuginfo@1.5.0.12-25.el4?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "thunderbird-0:1.5.0.12-25.el4.src", "product": { "name": "thunderbird-0:1.5.0.12-25.el4.src", "product_id": "thunderbird-0:1.5.0.12-25.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird@1.5.0.12-25.el4?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "thunderbird-0:1.5.0.12-25.el4.x86_64", "product": { "name": "thunderbird-0:1.5.0.12-25.el4.x86_64", "product_id": "thunderbird-0:1.5.0.12-25.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird@1.5.0.12-25.el4?arch=x86_64" } } }, { "category": "product_version", "name": "thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "product": { "name": "thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "product_id": "thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird-debuginfo@1.5.0.12-25.el4?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "thunderbird-0:1.5.0.12-25.el4.i386", "product": { "name": "thunderbird-0:1.5.0.12-25.el4.i386", "product_id": "thunderbird-0:1.5.0.12-25.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird@1.5.0.12-25.el4?arch=i386" } } }, { "category": "product_version", "name": "thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "product": { "name": "thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "product_id": "thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird-debuginfo@1.5.0.12-25.el4?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "thunderbird-0:1.5.0.12-25.el4.ppc", "product": { "name": "thunderbird-0:1.5.0.12-25.el4.ppc", "product_id": "thunderbird-0:1.5.0.12-25.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird@1.5.0.12-25.el4?arch=ppc" } } }, { "category": "product_version", "name": "thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "product": { "name": "thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "product_id": "thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird-debuginfo@1.5.0.12-25.el4?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "thunderbird-0:1.5.0.12-25.el4.s390x", "product": { "name": "thunderbird-0:1.5.0.12-25.el4.s390x", "product_id": "thunderbird-0:1.5.0.12-25.el4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird@1.5.0.12-25.el4?arch=s390x" } } }, { "category": "product_version", "name": "thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "product": { "name": "thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "product_id": "thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird-debuginfo@1.5.0.12-25.el4?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "thunderbird-0:1.5.0.12-25.el4.s390", "product": { "name": "thunderbird-0:1.5.0.12-25.el4.s390", "product_id": "thunderbird-0:1.5.0.12-25.el4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird@1.5.0.12-25.el4?arch=s390" } } }, { "category": "product_version", "name": "thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "product": { "name": "thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "product_id": "thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird-debuginfo@1.5.0.12-25.el4?arch=s390" } } } ], "category": "architecture", "name": "s390" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.12-25.el4.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:thunderbird-0:1.5.0.12-25.el4.i386" }, "product_reference": "thunderbird-0:1.5.0.12-25.el4.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.12-25.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:thunderbird-0:1.5.0.12-25.el4.ia64" }, "product_reference": "thunderbird-0:1.5.0.12-25.el4.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.12-25.el4.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:thunderbird-0:1.5.0.12-25.el4.ppc" }, "product_reference": "thunderbird-0:1.5.0.12-25.el4.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.12-25.el4.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:thunderbird-0:1.5.0.12-25.el4.s390" }, "product_reference": "thunderbird-0:1.5.0.12-25.el4.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.12-25.el4.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:thunderbird-0:1.5.0.12-25.el4.s390x" }, "product_reference": "thunderbird-0:1.5.0.12-25.el4.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.12-25.el4.src as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:thunderbird-0:1.5.0.12-25.el4.src" }, "product_reference": "thunderbird-0:1.5.0.12-25.el4.src", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.12-25.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:thunderbird-0:1.5.0.12-25.el4.x86_64" }, "product_reference": "thunderbird-0:1.5.0.12-25.el4.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:1.5.0.12-25.el4.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386" }, "product_reference": "thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64" }, "product_reference": "thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc" }, "product_reference": "thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:1.5.0.12-25.el4.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390" }, "product_reference": "thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x" }, "product_reference": "thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64" }, "product_reference": "thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.12-25.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:thunderbird-0:1.5.0.12-25.el4.i386" }, "product_reference": "thunderbird-0:1.5.0.12-25.el4.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.12-25.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:thunderbird-0:1.5.0.12-25.el4.ia64" }, "product_reference": "thunderbird-0:1.5.0.12-25.el4.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.12-25.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:thunderbird-0:1.5.0.12-25.el4.ppc" }, "product_reference": "thunderbird-0:1.5.0.12-25.el4.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.12-25.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:thunderbird-0:1.5.0.12-25.el4.s390" }, "product_reference": "thunderbird-0:1.5.0.12-25.el4.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.12-25.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:thunderbird-0:1.5.0.12-25.el4.s390x" }, "product_reference": "thunderbird-0:1.5.0.12-25.el4.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.12-25.el4.src as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:thunderbird-0:1.5.0.12-25.el4.src" }, "product_reference": "thunderbird-0:1.5.0.12-25.el4.src", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.12-25.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:thunderbird-0:1.5.0.12-25.el4.x86_64" }, "product_reference": "thunderbird-0:1.5.0.12-25.el4.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:1.5.0.12-25.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386" }, "product_reference": "thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64" }, "product_reference": "thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc" }, "product_reference": "thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:1.5.0.12-25.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390" }, "product_reference": "thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x" }, "product_reference": "thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64" }, "product_reference": "thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.12-25.el4.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:thunderbird-0:1.5.0.12-25.el4.i386" }, "product_reference": "thunderbird-0:1.5.0.12-25.el4.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.12-25.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:thunderbird-0:1.5.0.12-25.el4.ia64" }, "product_reference": "thunderbird-0:1.5.0.12-25.el4.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.12-25.el4.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:thunderbird-0:1.5.0.12-25.el4.ppc" }, "product_reference": "thunderbird-0:1.5.0.12-25.el4.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.12-25.el4.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:thunderbird-0:1.5.0.12-25.el4.s390" }, "product_reference": "thunderbird-0:1.5.0.12-25.el4.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.12-25.el4.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:thunderbird-0:1.5.0.12-25.el4.s390x" }, "product_reference": "thunderbird-0:1.5.0.12-25.el4.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.12-25.el4.src as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:thunderbird-0:1.5.0.12-25.el4.src" }, "product_reference": "thunderbird-0:1.5.0.12-25.el4.src", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.12-25.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:thunderbird-0:1.5.0.12-25.el4.x86_64" }, "product_reference": "thunderbird-0:1.5.0.12-25.el4.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:1.5.0.12-25.el4.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386" }, "product_reference": "thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64" }, "product_reference": "thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc" }, "product_reference": "thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:1.5.0.12-25.el4.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390" }, "product_reference": "thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x" }, "product_reference": "thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64" }, "product_reference": "thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.12-25.el4.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:thunderbird-0:1.5.0.12-25.el4.i386" }, "product_reference": "thunderbird-0:1.5.0.12-25.el4.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.12-25.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:thunderbird-0:1.5.0.12-25.el4.ia64" }, "product_reference": "thunderbird-0:1.5.0.12-25.el4.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.12-25.el4.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:thunderbird-0:1.5.0.12-25.el4.ppc" }, "product_reference": "thunderbird-0:1.5.0.12-25.el4.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.12-25.el4.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:thunderbird-0:1.5.0.12-25.el4.s390" }, "product_reference": "thunderbird-0:1.5.0.12-25.el4.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.12-25.el4.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:thunderbird-0:1.5.0.12-25.el4.s390x" }, "product_reference": "thunderbird-0:1.5.0.12-25.el4.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.12-25.el4.src as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:thunderbird-0:1.5.0.12-25.el4.src" }, "product_reference": "thunderbird-0:1.5.0.12-25.el4.src", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.12-25.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:thunderbird-0:1.5.0.12-25.el4.x86_64" }, "product_reference": "thunderbird-0:1.5.0.12-25.el4.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:1.5.0.12-25.el4.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386" }, "product_reference": "thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64" }, "product_reference": "thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc" }, "product_reference": "thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:1.5.0.12-25.el4.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390" }, "product_reference": "thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x" }, "product_reference": "thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64" }, "product_reference": "thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "relates_to_product_reference": "4WS" } ] }, "vulnerabilities": [ { "cve": "CVE-2009-0689", "discovery_date": "2009-11-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "539784" } ], "notes": [ { "category": "description", "text": "Array index error in the (1) dtoa implementation in dtoa.c (aka pdtoa.c) and the (2) gdtoa (aka new dtoa) implementation in gdtoa/misc.c in libc, as used in multiple operating systems and products including in FreeBSD 6.4 and 7.2, NetBSD 5.0, OpenBSD 4.5, Mozilla Firefox 3.0.x before 3.0.15 and 3.5.x before 3.5.4, K-Meleon 1.5.3, SeaMonkey 1.1.8, and other products, allows context-dependent attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a large precision value in the format argument to a printf function, which triggers incorrect memory allocation and a heap-based buffer overflow during conversion to a floating-point number.", "title": "Vulnerability description" }, { "category": "summary", "text": "array index error in dtoa implementation of many products", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS:thunderbird-0:1.5.0.12-25.el4.i386", "4AS:thunderbird-0:1.5.0.12-25.el4.ia64", "4AS:thunderbird-0:1.5.0.12-25.el4.ppc", "4AS:thunderbird-0:1.5.0.12-25.el4.s390", "4AS:thunderbird-0:1.5.0.12-25.el4.s390x", "4AS:thunderbird-0:1.5.0.12-25.el4.src", "4AS:thunderbird-0:1.5.0.12-25.el4.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4Desktop:thunderbird-0:1.5.0.12-25.el4.i386", "4Desktop:thunderbird-0:1.5.0.12-25.el4.ia64", "4Desktop:thunderbird-0:1.5.0.12-25.el4.ppc", "4Desktop:thunderbird-0:1.5.0.12-25.el4.s390", "4Desktop:thunderbird-0:1.5.0.12-25.el4.s390x", "4Desktop:thunderbird-0:1.5.0.12-25.el4.src", "4Desktop:thunderbird-0:1.5.0.12-25.el4.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4ES:thunderbird-0:1.5.0.12-25.el4.i386", "4ES:thunderbird-0:1.5.0.12-25.el4.ia64", "4ES:thunderbird-0:1.5.0.12-25.el4.ppc", "4ES:thunderbird-0:1.5.0.12-25.el4.s390", "4ES:thunderbird-0:1.5.0.12-25.el4.s390x", "4ES:thunderbird-0:1.5.0.12-25.el4.src", "4ES:thunderbird-0:1.5.0.12-25.el4.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4WS:thunderbird-0:1.5.0.12-25.el4.i386", "4WS:thunderbird-0:1.5.0.12-25.el4.ia64", "4WS:thunderbird-0:1.5.0.12-25.el4.ppc", "4WS:thunderbird-0:1.5.0.12-25.el4.s390", "4WS:thunderbird-0:1.5.0.12-25.el4.s390x", "4WS:thunderbird-0:1.5.0.12-25.el4.src", "4WS:thunderbird-0:1.5.0.12-25.el4.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-0689" }, { "category": "external", "summary": "RHBZ#539784", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=539784" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-0689", "url": "https://www.cve.org/CVERecord?id=CVE-2009-0689" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-0689", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0689" } ], "release_date": "2009-11-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-03-17T13:04:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS:thunderbird-0:1.5.0.12-25.el4.i386", "4AS:thunderbird-0:1.5.0.12-25.el4.ia64", "4AS:thunderbird-0:1.5.0.12-25.el4.ppc", "4AS:thunderbird-0:1.5.0.12-25.el4.s390", "4AS:thunderbird-0:1.5.0.12-25.el4.s390x", "4AS:thunderbird-0:1.5.0.12-25.el4.src", "4AS:thunderbird-0:1.5.0.12-25.el4.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4Desktop:thunderbird-0:1.5.0.12-25.el4.i386", "4Desktop:thunderbird-0:1.5.0.12-25.el4.ia64", "4Desktop:thunderbird-0:1.5.0.12-25.el4.ppc", "4Desktop:thunderbird-0:1.5.0.12-25.el4.s390", "4Desktop:thunderbird-0:1.5.0.12-25.el4.s390x", "4Desktop:thunderbird-0:1.5.0.12-25.el4.src", "4Desktop:thunderbird-0:1.5.0.12-25.el4.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4ES:thunderbird-0:1.5.0.12-25.el4.i386", "4ES:thunderbird-0:1.5.0.12-25.el4.ia64", "4ES:thunderbird-0:1.5.0.12-25.el4.ppc", "4ES:thunderbird-0:1.5.0.12-25.el4.s390", "4ES:thunderbird-0:1.5.0.12-25.el4.s390x", "4ES:thunderbird-0:1.5.0.12-25.el4.src", "4ES:thunderbird-0:1.5.0.12-25.el4.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4WS:thunderbird-0:1.5.0.12-25.el4.i386", "4WS:thunderbird-0:1.5.0.12-25.el4.ia64", "4WS:thunderbird-0:1.5.0.12-25.el4.ppc", "4WS:thunderbird-0:1.5.0.12-25.el4.s390", "4WS:thunderbird-0:1.5.0.12-25.el4.s390x", "4WS:thunderbird-0:1.5.0.12-25.el4.src", "4WS:thunderbird-0:1.5.0.12-25.el4.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0154" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS:thunderbird-0:1.5.0.12-25.el4.i386", "4AS:thunderbird-0:1.5.0.12-25.el4.ia64", "4AS:thunderbird-0:1.5.0.12-25.el4.ppc", "4AS:thunderbird-0:1.5.0.12-25.el4.s390", "4AS:thunderbird-0:1.5.0.12-25.el4.s390x", "4AS:thunderbird-0:1.5.0.12-25.el4.src", "4AS:thunderbird-0:1.5.0.12-25.el4.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4Desktop:thunderbird-0:1.5.0.12-25.el4.i386", "4Desktop:thunderbird-0:1.5.0.12-25.el4.ia64", "4Desktop:thunderbird-0:1.5.0.12-25.el4.ppc", "4Desktop:thunderbird-0:1.5.0.12-25.el4.s390", "4Desktop:thunderbird-0:1.5.0.12-25.el4.s390x", "4Desktop:thunderbird-0:1.5.0.12-25.el4.src", "4Desktop:thunderbird-0:1.5.0.12-25.el4.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4ES:thunderbird-0:1.5.0.12-25.el4.i386", "4ES:thunderbird-0:1.5.0.12-25.el4.ia64", "4ES:thunderbird-0:1.5.0.12-25.el4.ppc", "4ES:thunderbird-0:1.5.0.12-25.el4.s390", "4ES:thunderbird-0:1.5.0.12-25.el4.s390x", "4ES:thunderbird-0:1.5.0.12-25.el4.src", "4ES:thunderbird-0:1.5.0.12-25.el4.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4WS:thunderbird-0:1.5.0.12-25.el4.i386", "4WS:thunderbird-0:1.5.0.12-25.el4.ia64", "4WS:thunderbird-0:1.5.0.12-25.el4.ppc", "4WS:thunderbird-0:1.5.0.12-25.el4.s390", "4WS:thunderbird-0:1.5.0.12-25.el4.s390x", "4WS:thunderbird-0:1.5.0.12-25.el4.src", "4WS:thunderbird-0:1.5.0.12-25.el4.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "array index error in dtoa implementation of many products" }, { "cve": "CVE-2009-1571", "discovery_date": "2010-02-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "566050" } ], "notes": [ { "category": "description", "text": "Use-after-free vulnerability in the HTML parser in Mozilla Firefox 3.0.x before 3.0.18 and 3.5.x before 3.5.8, Thunderbird before 3.0.2, and SeaMonkey before 2.0.3 allows remote attackers to execute arbitrary code via unspecified method calls that attempt to access freed objects in low-memory situations.", "title": "Vulnerability description" }, { "category": "summary", "text": "Mozilla incorrectly frees used memory (MFSA 2010-03)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS:thunderbird-0:1.5.0.12-25.el4.i386", "4AS:thunderbird-0:1.5.0.12-25.el4.ia64", "4AS:thunderbird-0:1.5.0.12-25.el4.ppc", "4AS:thunderbird-0:1.5.0.12-25.el4.s390", "4AS:thunderbird-0:1.5.0.12-25.el4.s390x", "4AS:thunderbird-0:1.5.0.12-25.el4.src", "4AS:thunderbird-0:1.5.0.12-25.el4.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4Desktop:thunderbird-0:1.5.0.12-25.el4.i386", "4Desktop:thunderbird-0:1.5.0.12-25.el4.ia64", "4Desktop:thunderbird-0:1.5.0.12-25.el4.ppc", "4Desktop:thunderbird-0:1.5.0.12-25.el4.s390", "4Desktop:thunderbird-0:1.5.0.12-25.el4.s390x", "4Desktop:thunderbird-0:1.5.0.12-25.el4.src", "4Desktop:thunderbird-0:1.5.0.12-25.el4.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4ES:thunderbird-0:1.5.0.12-25.el4.i386", "4ES:thunderbird-0:1.5.0.12-25.el4.ia64", "4ES:thunderbird-0:1.5.0.12-25.el4.ppc", "4ES:thunderbird-0:1.5.0.12-25.el4.s390", "4ES:thunderbird-0:1.5.0.12-25.el4.s390x", "4ES:thunderbird-0:1.5.0.12-25.el4.src", "4ES:thunderbird-0:1.5.0.12-25.el4.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4WS:thunderbird-0:1.5.0.12-25.el4.i386", "4WS:thunderbird-0:1.5.0.12-25.el4.ia64", "4WS:thunderbird-0:1.5.0.12-25.el4.ppc", "4WS:thunderbird-0:1.5.0.12-25.el4.s390", "4WS:thunderbird-0:1.5.0.12-25.el4.s390x", "4WS:thunderbird-0:1.5.0.12-25.el4.src", "4WS:thunderbird-0:1.5.0.12-25.el4.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-1571" }, { "category": "external", "summary": "RHBZ#566050", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=566050" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1571", "url": "https://www.cve.org/CVERecord?id=CVE-2009-1571" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1571", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1571" } ], "release_date": "2010-02-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-03-17T13:04:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS:thunderbird-0:1.5.0.12-25.el4.i386", "4AS:thunderbird-0:1.5.0.12-25.el4.ia64", "4AS:thunderbird-0:1.5.0.12-25.el4.ppc", "4AS:thunderbird-0:1.5.0.12-25.el4.s390", "4AS:thunderbird-0:1.5.0.12-25.el4.s390x", "4AS:thunderbird-0:1.5.0.12-25.el4.src", "4AS:thunderbird-0:1.5.0.12-25.el4.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4Desktop:thunderbird-0:1.5.0.12-25.el4.i386", "4Desktop:thunderbird-0:1.5.0.12-25.el4.ia64", "4Desktop:thunderbird-0:1.5.0.12-25.el4.ppc", "4Desktop:thunderbird-0:1.5.0.12-25.el4.s390", "4Desktop:thunderbird-0:1.5.0.12-25.el4.s390x", "4Desktop:thunderbird-0:1.5.0.12-25.el4.src", "4Desktop:thunderbird-0:1.5.0.12-25.el4.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4ES:thunderbird-0:1.5.0.12-25.el4.i386", "4ES:thunderbird-0:1.5.0.12-25.el4.ia64", "4ES:thunderbird-0:1.5.0.12-25.el4.ppc", "4ES:thunderbird-0:1.5.0.12-25.el4.s390", "4ES:thunderbird-0:1.5.0.12-25.el4.s390x", "4ES:thunderbird-0:1.5.0.12-25.el4.src", "4ES:thunderbird-0:1.5.0.12-25.el4.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4WS:thunderbird-0:1.5.0.12-25.el4.i386", "4WS:thunderbird-0:1.5.0.12-25.el4.ia64", "4WS:thunderbird-0:1.5.0.12-25.el4.ppc", "4WS:thunderbird-0:1.5.0.12-25.el4.s390", "4WS:thunderbird-0:1.5.0.12-25.el4.s390x", "4WS:thunderbird-0:1.5.0.12-25.el4.src", "4WS:thunderbird-0:1.5.0.12-25.el4.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0154" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS:thunderbird-0:1.5.0.12-25.el4.i386", "4AS:thunderbird-0:1.5.0.12-25.el4.ia64", "4AS:thunderbird-0:1.5.0.12-25.el4.ppc", "4AS:thunderbird-0:1.5.0.12-25.el4.s390", "4AS:thunderbird-0:1.5.0.12-25.el4.s390x", "4AS:thunderbird-0:1.5.0.12-25.el4.src", "4AS:thunderbird-0:1.5.0.12-25.el4.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4Desktop:thunderbird-0:1.5.0.12-25.el4.i386", "4Desktop:thunderbird-0:1.5.0.12-25.el4.ia64", "4Desktop:thunderbird-0:1.5.0.12-25.el4.ppc", "4Desktop:thunderbird-0:1.5.0.12-25.el4.s390", "4Desktop:thunderbird-0:1.5.0.12-25.el4.s390x", "4Desktop:thunderbird-0:1.5.0.12-25.el4.src", "4Desktop:thunderbird-0:1.5.0.12-25.el4.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4ES:thunderbird-0:1.5.0.12-25.el4.i386", "4ES:thunderbird-0:1.5.0.12-25.el4.ia64", "4ES:thunderbird-0:1.5.0.12-25.el4.ppc", "4ES:thunderbird-0:1.5.0.12-25.el4.s390", "4ES:thunderbird-0:1.5.0.12-25.el4.s390x", "4ES:thunderbird-0:1.5.0.12-25.el4.src", "4ES:thunderbird-0:1.5.0.12-25.el4.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4WS:thunderbird-0:1.5.0.12-25.el4.i386", "4WS:thunderbird-0:1.5.0.12-25.el4.ia64", "4WS:thunderbird-0:1.5.0.12-25.el4.ppc", "4WS:thunderbird-0:1.5.0.12-25.el4.s390", "4WS:thunderbird-0:1.5.0.12-25.el4.s390x", "4WS:thunderbird-0:1.5.0.12-25.el4.src", "4WS:thunderbird-0:1.5.0.12-25.el4.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "Mozilla incorrectly frees used memory (MFSA 2010-03)" }, { "cve": "CVE-2009-2462", "discovery_date": "2009-07-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "512128" } ], "notes": [ { "category": "description", "text": "The browser engine in Mozilla Firefox before 3.0.12 and Thunderbird allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to (1) the frame chain and synchronous events, (2) a SetMayHaveFrame assertion and nsCSSFrameConstructor::CreateFloatingLetterFrame, (3) nsCSSFrameConstructor::ConstructFrame, (4) the child list and initial reflow, (5) GetLastSpecialSibling, (6) nsFrameManager::GetPrimaryFrameFor and MathML, (7) nsFrame::GetBoxAscent, (8) nsCSSFrameConstructor::AdjustParentFrame, (9) nsDOMOfflineResourceList, and (10) nsContentUtils::ComparePosition.", "title": "Vulnerability description" }, { "category": "summary", "text": "Mozilla Browser engine crashes", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS:thunderbird-0:1.5.0.12-25.el4.i386", "4AS:thunderbird-0:1.5.0.12-25.el4.ia64", "4AS:thunderbird-0:1.5.0.12-25.el4.ppc", "4AS:thunderbird-0:1.5.0.12-25.el4.s390", "4AS:thunderbird-0:1.5.0.12-25.el4.s390x", "4AS:thunderbird-0:1.5.0.12-25.el4.src", "4AS:thunderbird-0:1.5.0.12-25.el4.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4Desktop:thunderbird-0:1.5.0.12-25.el4.i386", "4Desktop:thunderbird-0:1.5.0.12-25.el4.ia64", "4Desktop:thunderbird-0:1.5.0.12-25.el4.ppc", "4Desktop:thunderbird-0:1.5.0.12-25.el4.s390", "4Desktop:thunderbird-0:1.5.0.12-25.el4.s390x", "4Desktop:thunderbird-0:1.5.0.12-25.el4.src", "4Desktop:thunderbird-0:1.5.0.12-25.el4.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4ES:thunderbird-0:1.5.0.12-25.el4.i386", "4ES:thunderbird-0:1.5.0.12-25.el4.ia64", "4ES:thunderbird-0:1.5.0.12-25.el4.ppc", "4ES:thunderbird-0:1.5.0.12-25.el4.s390", "4ES:thunderbird-0:1.5.0.12-25.el4.s390x", "4ES:thunderbird-0:1.5.0.12-25.el4.src", "4ES:thunderbird-0:1.5.0.12-25.el4.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4WS:thunderbird-0:1.5.0.12-25.el4.i386", "4WS:thunderbird-0:1.5.0.12-25.el4.ia64", "4WS:thunderbird-0:1.5.0.12-25.el4.ppc", "4WS:thunderbird-0:1.5.0.12-25.el4.s390", "4WS:thunderbird-0:1.5.0.12-25.el4.s390x", "4WS:thunderbird-0:1.5.0.12-25.el4.src", "4WS:thunderbird-0:1.5.0.12-25.el4.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-2462" }, { "category": "external", "summary": "RHBZ#512128", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512128" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2462", "url": "https://www.cve.org/CVERecord?id=CVE-2009-2462" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2462", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2462" } ], "release_date": "2009-07-21T23:56:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-03-17T13:04:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS:thunderbird-0:1.5.0.12-25.el4.i386", "4AS:thunderbird-0:1.5.0.12-25.el4.ia64", "4AS:thunderbird-0:1.5.0.12-25.el4.ppc", "4AS:thunderbird-0:1.5.0.12-25.el4.s390", "4AS:thunderbird-0:1.5.0.12-25.el4.s390x", "4AS:thunderbird-0:1.5.0.12-25.el4.src", "4AS:thunderbird-0:1.5.0.12-25.el4.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4Desktop:thunderbird-0:1.5.0.12-25.el4.i386", "4Desktop:thunderbird-0:1.5.0.12-25.el4.ia64", "4Desktop:thunderbird-0:1.5.0.12-25.el4.ppc", "4Desktop:thunderbird-0:1.5.0.12-25.el4.s390", "4Desktop:thunderbird-0:1.5.0.12-25.el4.s390x", "4Desktop:thunderbird-0:1.5.0.12-25.el4.src", "4Desktop:thunderbird-0:1.5.0.12-25.el4.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4ES:thunderbird-0:1.5.0.12-25.el4.i386", "4ES:thunderbird-0:1.5.0.12-25.el4.ia64", "4ES:thunderbird-0:1.5.0.12-25.el4.ppc", "4ES:thunderbird-0:1.5.0.12-25.el4.s390", "4ES:thunderbird-0:1.5.0.12-25.el4.s390x", "4ES:thunderbird-0:1.5.0.12-25.el4.src", "4ES:thunderbird-0:1.5.0.12-25.el4.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4WS:thunderbird-0:1.5.0.12-25.el4.i386", "4WS:thunderbird-0:1.5.0.12-25.el4.ia64", "4WS:thunderbird-0:1.5.0.12-25.el4.ppc", "4WS:thunderbird-0:1.5.0.12-25.el4.s390", "4WS:thunderbird-0:1.5.0.12-25.el4.s390x", "4WS:thunderbird-0:1.5.0.12-25.el4.src", "4WS:thunderbird-0:1.5.0.12-25.el4.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0154" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS:thunderbird-0:1.5.0.12-25.el4.i386", "4AS:thunderbird-0:1.5.0.12-25.el4.ia64", "4AS:thunderbird-0:1.5.0.12-25.el4.ppc", "4AS:thunderbird-0:1.5.0.12-25.el4.s390", "4AS:thunderbird-0:1.5.0.12-25.el4.s390x", "4AS:thunderbird-0:1.5.0.12-25.el4.src", "4AS:thunderbird-0:1.5.0.12-25.el4.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4Desktop:thunderbird-0:1.5.0.12-25.el4.i386", "4Desktop:thunderbird-0:1.5.0.12-25.el4.ia64", "4Desktop:thunderbird-0:1.5.0.12-25.el4.ppc", "4Desktop:thunderbird-0:1.5.0.12-25.el4.s390", "4Desktop:thunderbird-0:1.5.0.12-25.el4.s390x", "4Desktop:thunderbird-0:1.5.0.12-25.el4.src", "4Desktop:thunderbird-0:1.5.0.12-25.el4.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4ES:thunderbird-0:1.5.0.12-25.el4.i386", "4ES:thunderbird-0:1.5.0.12-25.el4.ia64", "4ES:thunderbird-0:1.5.0.12-25.el4.ppc", "4ES:thunderbird-0:1.5.0.12-25.el4.s390", "4ES:thunderbird-0:1.5.0.12-25.el4.s390x", "4ES:thunderbird-0:1.5.0.12-25.el4.src", "4ES:thunderbird-0:1.5.0.12-25.el4.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4WS:thunderbird-0:1.5.0.12-25.el4.i386", "4WS:thunderbird-0:1.5.0.12-25.el4.ia64", "4WS:thunderbird-0:1.5.0.12-25.el4.ppc", "4WS:thunderbird-0:1.5.0.12-25.el4.s390", "4WS:thunderbird-0:1.5.0.12-25.el4.s390x", "4WS:thunderbird-0:1.5.0.12-25.el4.src", "4WS:thunderbird-0:1.5.0.12-25.el4.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "Mozilla Browser engine crashes" }, { "cve": "CVE-2009-2463", "discovery_date": "2009-07-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "512131" } ], "notes": [ { "category": "description", "text": "Multiple integer overflows in the (1) PL_Base64Decode and (2) PL_Base64Encode functions in nsprpub/lib/libc/src/base64.c in Mozilla Firefox before 3.0.12, Thunderbird before 2.0.0.24, and SeaMonkey before 1.1.19 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unspecified vectors that trigger buffer overflows.", "title": "Vulnerability description" }, { "category": "summary", "text": "Mozilla Base64 decoding crash", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS:thunderbird-0:1.5.0.12-25.el4.i386", "4AS:thunderbird-0:1.5.0.12-25.el4.ia64", "4AS:thunderbird-0:1.5.0.12-25.el4.ppc", "4AS:thunderbird-0:1.5.0.12-25.el4.s390", "4AS:thunderbird-0:1.5.0.12-25.el4.s390x", "4AS:thunderbird-0:1.5.0.12-25.el4.src", "4AS:thunderbird-0:1.5.0.12-25.el4.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4Desktop:thunderbird-0:1.5.0.12-25.el4.i386", "4Desktop:thunderbird-0:1.5.0.12-25.el4.ia64", "4Desktop:thunderbird-0:1.5.0.12-25.el4.ppc", "4Desktop:thunderbird-0:1.5.0.12-25.el4.s390", "4Desktop:thunderbird-0:1.5.0.12-25.el4.s390x", "4Desktop:thunderbird-0:1.5.0.12-25.el4.src", "4Desktop:thunderbird-0:1.5.0.12-25.el4.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4ES:thunderbird-0:1.5.0.12-25.el4.i386", "4ES:thunderbird-0:1.5.0.12-25.el4.ia64", "4ES:thunderbird-0:1.5.0.12-25.el4.ppc", "4ES:thunderbird-0:1.5.0.12-25.el4.s390", "4ES:thunderbird-0:1.5.0.12-25.el4.s390x", "4ES:thunderbird-0:1.5.0.12-25.el4.src", "4ES:thunderbird-0:1.5.0.12-25.el4.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4WS:thunderbird-0:1.5.0.12-25.el4.i386", "4WS:thunderbird-0:1.5.0.12-25.el4.ia64", "4WS:thunderbird-0:1.5.0.12-25.el4.ppc", "4WS:thunderbird-0:1.5.0.12-25.el4.s390", "4WS:thunderbird-0:1.5.0.12-25.el4.s390x", "4WS:thunderbird-0:1.5.0.12-25.el4.src", "4WS:thunderbird-0:1.5.0.12-25.el4.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-2463" }, { "category": "external", "summary": "RHBZ#512131", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512131" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2463", "url": "https://www.cve.org/CVERecord?id=CVE-2009-2463" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2463", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2463" } ], "release_date": "2009-07-21T23:56:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-03-17T13:04:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS:thunderbird-0:1.5.0.12-25.el4.i386", "4AS:thunderbird-0:1.5.0.12-25.el4.ia64", "4AS:thunderbird-0:1.5.0.12-25.el4.ppc", "4AS:thunderbird-0:1.5.0.12-25.el4.s390", "4AS:thunderbird-0:1.5.0.12-25.el4.s390x", "4AS:thunderbird-0:1.5.0.12-25.el4.src", "4AS:thunderbird-0:1.5.0.12-25.el4.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4Desktop:thunderbird-0:1.5.0.12-25.el4.i386", "4Desktop:thunderbird-0:1.5.0.12-25.el4.ia64", "4Desktop:thunderbird-0:1.5.0.12-25.el4.ppc", "4Desktop:thunderbird-0:1.5.0.12-25.el4.s390", "4Desktop:thunderbird-0:1.5.0.12-25.el4.s390x", "4Desktop:thunderbird-0:1.5.0.12-25.el4.src", "4Desktop:thunderbird-0:1.5.0.12-25.el4.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4ES:thunderbird-0:1.5.0.12-25.el4.i386", "4ES:thunderbird-0:1.5.0.12-25.el4.ia64", "4ES:thunderbird-0:1.5.0.12-25.el4.ppc", "4ES:thunderbird-0:1.5.0.12-25.el4.s390", "4ES:thunderbird-0:1.5.0.12-25.el4.s390x", "4ES:thunderbird-0:1.5.0.12-25.el4.src", "4ES:thunderbird-0:1.5.0.12-25.el4.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4WS:thunderbird-0:1.5.0.12-25.el4.i386", "4WS:thunderbird-0:1.5.0.12-25.el4.ia64", "4WS:thunderbird-0:1.5.0.12-25.el4.ppc", "4WS:thunderbird-0:1.5.0.12-25.el4.s390", "4WS:thunderbird-0:1.5.0.12-25.el4.s390x", "4WS:thunderbird-0:1.5.0.12-25.el4.src", "4WS:thunderbird-0:1.5.0.12-25.el4.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0154" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS:thunderbird-0:1.5.0.12-25.el4.i386", "4AS:thunderbird-0:1.5.0.12-25.el4.ia64", "4AS:thunderbird-0:1.5.0.12-25.el4.ppc", "4AS:thunderbird-0:1.5.0.12-25.el4.s390", "4AS:thunderbird-0:1.5.0.12-25.el4.s390x", "4AS:thunderbird-0:1.5.0.12-25.el4.src", "4AS:thunderbird-0:1.5.0.12-25.el4.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4Desktop:thunderbird-0:1.5.0.12-25.el4.i386", "4Desktop:thunderbird-0:1.5.0.12-25.el4.ia64", "4Desktop:thunderbird-0:1.5.0.12-25.el4.ppc", "4Desktop:thunderbird-0:1.5.0.12-25.el4.s390", "4Desktop:thunderbird-0:1.5.0.12-25.el4.s390x", "4Desktop:thunderbird-0:1.5.0.12-25.el4.src", "4Desktop:thunderbird-0:1.5.0.12-25.el4.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4ES:thunderbird-0:1.5.0.12-25.el4.i386", "4ES:thunderbird-0:1.5.0.12-25.el4.ia64", "4ES:thunderbird-0:1.5.0.12-25.el4.ppc", "4ES:thunderbird-0:1.5.0.12-25.el4.s390", "4ES:thunderbird-0:1.5.0.12-25.el4.s390x", "4ES:thunderbird-0:1.5.0.12-25.el4.src", "4ES:thunderbird-0:1.5.0.12-25.el4.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4WS:thunderbird-0:1.5.0.12-25.el4.i386", "4WS:thunderbird-0:1.5.0.12-25.el4.ia64", "4WS:thunderbird-0:1.5.0.12-25.el4.ppc", "4WS:thunderbird-0:1.5.0.12-25.el4.s390", "4WS:thunderbird-0:1.5.0.12-25.el4.s390x", "4WS:thunderbird-0:1.5.0.12-25.el4.src", "4WS:thunderbird-0:1.5.0.12-25.el4.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "Mozilla Base64 decoding crash" }, { "cve": "CVE-2009-2466", "discovery_date": "2009-07-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "512136" } ], "notes": [ { "category": "description", "text": "The JavaScript engine in Mozilla Firefox before 3.0.12 and Thunderbird allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to (1) nsDOMClassInfo.cpp, (2) JS_HashTableRawLookup, and (3) MirrorWrappedNativeParent and js_LockGCThingRT.", "title": "Vulnerability description" }, { "category": "summary", "text": "Mozilla JavaScript engine crashes", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS:thunderbird-0:1.5.0.12-25.el4.i386", "4AS:thunderbird-0:1.5.0.12-25.el4.ia64", "4AS:thunderbird-0:1.5.0.12-25.el4.ppc", "4AS:thunderbird-0:1.5.0.12-25.el4.s390", "4AS:thunderbird-0:1.5.0.12-25.el4.s390x", "4AS:thunderbird-0:1.5.0.12-25.el4.src", "4AS:thunderbird-0:1.5.0.12-25.el4.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4Desktop:thunderbird-0:1.5.0.12-25.el4.i386", "4Desktop:thunderbird-0:1.5.0.12-25.el4.ia64", "4Desktop:thunderbird-0:1.5.0.12-25.el4.ppc", "4Desktop:thunderbird-0:1.5.0.12-25.el4.s390", "4Desktop:thunderbird-0:1.5.0.12-25.el4.s390x", "4Desktop:thunderbird-0:1.5.0.12-25.el4.src", "4Desktop:thunderbird-0:1.5.0.12-25.el4.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4ES:thunderbird-0:1.5.0.12-25.el4.i386", "4ES:thunderbird-0:1.5.0.12-25.el4.ia64", "4ES:thunderbird-0:1.5.0.12-25.el4.ppc", "4ES:thunderbird-0:1.5.0.12-25.el4.s390", "4ES:thunderbird-0:1.5.0.12-25.el4.s390x", "4ES:thunderbird-0:1.5.0.12-25.el4.src", "4ES:thunderbird-0:1.5.0.12-25.el4.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4WS:thunderbird-0:1.5.0.12-25.el4.i386", "4WS:thunderbird-0:1.5.0.12-25.el4.ia64", "4WS:thunderbird-0:1.5.0.12-25.el4.ppc", "4WS:thunderbird-0:1.5.0.12-25.el4.s390", "4WS:thunderbird-0:1.5.0.12-25.el4.s390x", "4WS:thunderbird-0:1.5.0.12-25.el4.src", "4WS:thunderbird-0:1.5.0.12-25.el4.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-2466" }, { "category": "external", "summary": "RHBZ#512136", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512136" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2466", "url": "https://www.cve.org/CVERecord?id=CVE-2009-2466" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2466", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2466" } ], "release_date": "2009-07-21T23:56:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-03-17T13:04:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS:thunderbird-0:1.5.0.12-25.el4.i386", "4AS:thunderbird-0:1.5.0.12-25.el4.ia64", "4AS:thunderbird-0:1.5.0.12-25.el4.ppc", "4AS:thunderbird-0:1.5.0.12-25.el4.s390", "4AS:thunderbird-0:1.5.0.12-25.el4.s390x", "4AS:thunderbird-0:1.5.0.12-25.el4.src", "4AS:thunderbird-0:1.5.0.12-25.el4.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4Desktop:thunderbird-0:1.5.0.12-25.el4.i386", "4Desktop:thunderbird-0:1.5.0.12-25.el4.ia64", "4Desktop:thunderbird-0:1.5.0.12-25.el4.ppc", "4Desktop:thunderbird-0:1.5.0.12-25.el4.s390", "4Desktop:thunderbird-0:1.5.0.12-25.el4.s390x", "4Desktop:thunderbird-0:1.5.0.12-25.el4.src", "4Desktop:thunderbird-0:1.5.0.12-25.el4.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4ES:thunderbird-0:1.5.0.12-25.el4.i386", "4ES:thunderbird-0:1.5.0.12-25.el4.ia64", "4ES:thunderbird-0:1.5.0.12-25.el4.ppc", "4ES:thunderbird-0:1.5.0.12-25.el4.s390", "4ES:thunderbird-0:1.5.0.12-25.el4.s390x", "4ES:thunderbird-0:1.5.0.12-25.el4.src", "4ES:thunderbird-0:1.5.0.12-25.el4.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4WS:thunderbird-0:1.5.0.12-25.el4.i386", "4WS:thunderbird-0:1.5.0.12-25.el4.ia64", "4WS:thunderbird-0:1.5.0.12-25.el4.ppc", "4WS:thunderbird-0:1.5.0.12-25.el4.s390", "4WS:thunderbird-0:1.5.0.12-25.el4.s390x", "4WS:thunderbird-0:1.5.0.12-25.el4.src", "4WS:thunderbird-0:1.5.0.12-25.el4.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0154" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS:thunderbird-0:1.5.0.12-25.el4.i386", "4AS:thunderbird-0:1.5.0.12-25.el4.ia64", "4AS:thunderbird-0:1.5.0.12-25.el4.ppc", "4AS:thunderbird-0:1.5.0.12-25.el4.s390", "4AS:thunderbird-0:1.5.0.12-25.el4.s390x", "4AS:thunderbird-0:1.5.0.12-25.el4.src", "4AS:thunderbird-0:1.5.0.12-25.el4.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4Desktop:thunderbird-0:1.5.0.12-25.el4.i386", "4Desktop:thunderbird-0:1.5.0.12-25.el4.ia64", "4Desktop:thunderbird-0:1.5.0.12-25.el4.ppc", "4Desktop:thunderbird-0:1.5.0.12-25.el4.s390", "4Desktop:thunderbird-0:1.5.0.12-25.el4.s390x", "4Desktop:thunderbird-0:1.5.0.12-25.el4.src", "4Desktop:thunderbird-0:1.5.0.12-25.el4.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4ES:thunderbird-0:1.5.0.12-25.el4.i386", "4ES:thunderbird-0:1.5.0.12-25.el4.ia64", "4ES:thunderbird-0:1.5.0.12-25.el4.ppc", "4ES:thunderbird-0:1.5.0.12-25.el4.s390", "4ES:thunderbird-0:1.5.0.12-25.el4.s390x", "4ES:thunderbird-0:1.5.0.12-25.el4.src", "4ES:thunderbird-0:1.5.0.12-25.el4.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4WS:thunderbird-0:1.5.0.12-25.el4.i386", "4WS:thunderbird-0:1.5.0.12-25.el4.ia64", "4WS:thunderbird-0:1.5.0.12-25.el4.ppc", "4WS:thunderbird-0:1.5.0.12-25.el4.s390", "4WS:thunderbird-0:1.5.0.12-25.el4.s390x", "4WS:thunderbird-0:1.5.0.12-25.el4.src", "4WS:thunderbird-0:1.5.0.12-25.el4.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "Mozilla JavaScript engine crashes" }, { "cve": "CVE-2009-2470", "discovery_date": "2009-07-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "512145" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox before 3.0.12, and 3.5.x before 3.5.2, allows remote SOCKS5 proxy servers to cause a denial of service (data stream corruption) via a long domain name in a reply.", "title": "Vulnerability description" }, { "category": "summary", "text": "Mozilla data corruption with SOCKS5 reply", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS:thunderbird-0:1.5.0.12-25.el4.i386", "4AS:thunderbird-0:1.5.0.12-25.el4.ia64", "4AS:thunderbird-0:1.5.0.12-25.el4.ppc", "4AS:thunderbird-0:1.5.0.12-25.el4.s390", "4AS:thunderbird-0:1.5.0.12-25.el4.s390x", "4AS:thunderbird-0:1.5.0.12-25.el4.src", "4AS:thunderbird-0:1.5.0.12-25.el4.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4Desktop:thunderbird-0:1.5.0.12-25.el4.i386", "4Desktop:thunderbird-0:1.5.0.12-25.el4.ia64", "4Desktop:thunderbird-0:1.5.0.12-25.el4.ppc", "4Desktop:thunderbird-0:1.5.0.12-25.el4.s390", "4Desktop:thunderbird-0:1.5.0.12-25.el4.s390x", "4Desktop:thunderbird-0:1.5.0.12-25.el4.src", "4Desktop:thunderbird-0:1.5.0.12-25.el4.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4ES:thunderbird-0:1.5.0.12-25.el4.i386", "4ES:thunderbird-0:1.5.0.12-25.el4.ia64", "4ES:thunderbird-0:1.5.0.12-25.el4.ppc", "4ES:thunderbird-0:1.5.0.12-25.el4.s390", "4ES:thunderbird-0:1.5.0.12-25.el4.s390x", "4ES:thunderbird-0:1.5.0.12-25.el4.src", "4ES:thunderbird-0:1.5.0.12-25.el4.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4WS:thunderbird-0:1.5.0.12-25.el4.i386", "4WS:thunderbird-0:1.5.0.12-25.el4.ia64", "4WS:thunderbird-0:1.5.0.12-25.el4.ppc", "4WS:thunderbird-0:1.5.0.12-25.el4.s390", "4WS:thunderbird-0:1.5.0.12-25.el4.s390x", "4WS:thunderbird-0:1.5.0.12-25.el4.src", "4WS:thunderbird-0:1.5.0.12-25.el4.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-2470" }, { "category": "external", "summary": "RHBZ#512145", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512145" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2470", "url": "https://www.cve.org/CVERecord?id=CVE-2009-2470" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2470", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2470" } ], "release_date": "2009-07-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-03-17T13:04:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS:thunderbird-0:1.5.0.12-25.el4.i386", "4AS:thunderbird-0:1.5.0.12-25.el4.ia64", "4AS:thunderbird-0:1.5.0.12-25.el4.ppc", "4AS:thunderbird-0:1.5.0.12-25.el4.s390", "4AS:thunderbird-0:1.5.0.12-25.el4.s390x", "4AS:thunderbird-0:1.5.0.12-25.el4.src", "4AS:thunderbird-0:1.5.0.12-25.el4.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4Desktop:thunderbird-0:1.5.0.12-25.el4.i386", "4Desktop:thunderbird-0:1.5.0.12-25.el4.ia64", "4Desktop:thunderbird-0:1.5.0.12-25.el4.ppc", "4Desktop:thunderbird-0:1.5.0.12-25.el4.s390", "4Desktop:thunderbird-0:1.5.0.12-25.el4.s390x", "4Desktop:thunderbird-0:1.5.0.12-25.el4.src", "4Desktop:thunderbird-0:1.5.0.12-25.el4.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4ES:thunderbird-0:1.5.0.12-25.el4.i386", "4ES:thunderbird-0:1.5.0.12-25.el4.ia64", "4ES:thunderbird-0:1.5.0.12-25.el4.ppc", "4ES:thunderbird-0:1.5.0.12-25.el4.s390", "4ES:thunderbird-0:1.5.0.12-25.el4.s390x", "4ES:thunderbird-0:1.5.0.12-25.el4.src", "4ES:thunderbird-0:1.5.0.12-25.el4.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4WS:thunderbird-0:1.5.0.12-25.el4.i386", "4WS:thunderbird-0:1.5.0.12-25.el4.ia64", "4WS:thunderbird-0:1.5.0.12-25.el4.ppc", "4WS:thunderbird-0:1.5.0.12-25.el4.s390", "4WS:thunderbird-0:1.5.0.12-25.el4.s390x", "4WS:thunderbird-0:1.5.0.12-25.el4.src", "4WS:thunderbird-0:1.5.0.12-25.el4.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0154" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "4AS:thunderbird-0:1.5.0.12-25.el4.i386", "4AS:thunderbird-0:1.5.0.12-25.el4.ia64", "4AS:thunderbird-0:1.5.0.12-25.el4.ppc", "4AS:thunderbird-0:1.5.0.12-25.el4.s390", "4AS:thunderbird-0:1.5.0.12-25.el4.s390x", "4AS:thunderbird-0:1.5.0.12-25.el4.src", "4AS:thunderbird-0:1.5.0.12-25.el4.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4Desktop:thunderbird-0:1.5.0.12-25.el4.i386", "4Desktop:thunderbird-0:1.5.0.12-25.el4.ia64", "4Desktop:thunderbird-0:1.5.0.12-25.el4.ppc", "4Desktop:thunderbird-0:1.5.0.12-25.el4.s390", "4Desktop:thunderbird-0:1.5.0.12-25.el4.s390x", "4Desktop:thunderbird-0:1.5.0.12-25.el4.src", "4Desktop:thunderbird-0:1.5.0.12-25.el4.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4ES:thunderbird-0:1.5.0.12-25.el4.i386", "4ES:thunderbird-0:1.5.0.12-25.el4.ia64", "4ES:thunderbird-0:1.5.0.12-25.el4.ppc", "4ES:thunderbird-0:1.5.0.12-25.el4.s390", "4ES:thunderbird-0:1.5.0.12-25.el4.s390x", "4ES:thunderbird-0:1.5.0.12-25.el4.src", "4ES:thunderbird-0:1.5.0.12-25.el4.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4WS:thunderbird-0:1.5.0.12-25.el4.i386", "4WS:thunderbird-0:1.5.0.12-25.el4.ia64", "4WS:thunderbird-0:1.5.0.12-25.el4.ppc", "4WS:thunderbird-0:1.5.0.12-25.el4.s390", "4WS:thunderbird-0:1.5.0.12-25.el4.s390x", "4WS:thunderbird-0:1.5.0.12-25.el4.src", "4WS:thunderbird-0:1.5.0.12-25.el4.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "Mozilla data corruption with SOCKS5 reply" }, { "cve": "CVE-2009-3072", "discovery_date": "2009-09-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "521688" } ], "notes": [ { "category": "description", "text": "Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.0.14 and 3.5.x before 3.5.3, Thunderbird before 2.0.0.24, and SeaMonkey before 1.1.19 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to the BinHex decoder in netwerk/streamconv/converters/nsBinHexDecoder.cpp, and unknown vectors.", "title": "Vulnerability description" }, { "category": "summary", "text": "Firefox 3.5.3 3.0.14 browser engine crashes", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS:thunderbird-0:1.5.0.12-25.el4.i386", "4AS:thunderbird-0:1.5.0.12-25.el4.ia64", "4AS:thunderbird-0:1.5.0.12-25.el4.ppc", "4AS:thunderbird-0:1.5.0.12-25.el4.s390", "4AS:thunderbird-0:1.5.0.12-25.el4.s390x", "4AS:thunderbird-0:1.5.0.12-25.el4.src", "4AS:thunderbird-0:1.5.0.12-25.el4.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4Desktop:thunderbird-0:1.5.0.12-25.el4.i386", "4Desktop:thunderbird-0:1.5.0.12-25.el4.ia64", "4Desktop:thunderbird-0:1.5.0.12-25.el4.ppc", "4Desktop:thunderbird-0:1.5.0.12-25.el4.s390", "4Desktop:thunderbird-0:1.5.0.12-25.el4.s390x", "4Desktop:thunderbird-0:1.5.0.12-25.el4.src", "4Desktop:thunderbird-0:1.5.0.12-25.el4.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4ES:thunderbird-0:1.5.0.12-25.el4.i386", "4ES:thunderbird-0:1.5.0.12-25.el4.ia64", "4ES:thunderbird-0:1.5.0.12-25.el4.ppc", "4ES:thunderbird-0:1.5.0.12-25.el4.s390", "4ES:thunderbird-0:1.5.0.12-25.el4.s390x", "4ES:thunderbird-0:1.5.0.12-25.el4.src", "4ES:thunderbird-0:1.5.0.12-25.el4.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4WS:thunderbird-0:1.5.0.12-25.el4.i386", "4WS:thunderbird-0:1.5.0.12-25.el4.ia64", "4WS:thunderbird-0:1.5.0.12-25.el4.ppc", "4WS:thunderbird-0:1.5.0.12-25.el4.s390", "4WS:thunderbird-0:1.5.0.12-25.el4.s390x", "4WS:thunderbird-0:1.5.0.12-25.el4.src", "4WS:thunderbird-0:1.5.0.12-25.el4.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-3072" }, { "category": "external", "summary": "RHBZ#521688", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=521688" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3072", "url": "https://www.cve.org/CVERecord?id=CVE-2009-3072" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3072", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3072" } ], "release_date": "2009-09-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-03-17T13:04:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS:thunderbird-0:1.5.0.12-25.el4.i386", "4AS:thunderbird-0:1.5.0.12-25.el4.ia64", "4AS:thunderbird-0:1.5.0.12-25.el4.ppc", "4AS:thunderbird-0:1.5.0.12-25.el4.s390", "4AS:thunderbird-0:1.5.0.12-25.el4.s390x", "4AS:thunderbird-0:1.5.0.12-25.el4.src", "4AS:thunderbird-0:1.5.0.12-25.el4.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4Desktop:thunderbird-0:1.5.0.12-25.el4.i386", "4Desktop:thunderbird-0:1.5.0.12-25.el4.ia64", "4Desktop:thunderbird-0:1.5.0.12-25.el4.ppc", "4Desktop:thunderbird-0:1.5.0.12-25.el4.s390", "4Desktop:thunderbird-0:1.5.0.12-25.el4.s390x", "4Desktop:thunderbird-0:1.5.0.12-25.el4.src", "4Desktop:thunderbird-0:1.5.0.12-25.el4.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4ES:thunderbird-0:1.5.0.12-25.el4.i386", "4ES:thunderbird-0:1.5.0.12-25.el4.ia64", "4ES:thunderbird-0:1.5.0.12-25.el4.ppc", "4ES:thunderbird-0:1.5.0.12-25.el4.s390", "4ES:thunderbird-0:1.5.0.12-25.el4.s390x", "4ES:thunderbird-0:1.5.0.12-25.el4.src", "4ES:thunderbird-0:1.5.0.12-25.el4.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4WS:thunderbird-0:1.5.0.12-25.el4.i386", "4WS:thunderbird-0:1.5.0.12-25.el4.ia64", "4WS:thunderbird-0:1.5.0.12-25.el4.ppc", "4WS:thunderbird-0:1.5.0.12-25.el4.s390", "4WS:thunderbird-0:1.5.0.12-25.el4.s390x", "4WS:thunderbird-0:1.5.0.12-25.el4.src", "4WS:thunderbird-0:1.5.0.12-25.el4.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0154" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS:thunderbird-0:1.5.0.12-25.el4.i386", "4AS:thunderbird-0:1.5.0.12-25.el4.ia64", "4AS:thunderbird-0:1.5.0.12-25.el4.ppc", "4AS:thunderbird-0:1.5.0.12-25.el4.s390", "4AS:thunderbird-0:1.5.0.12-25.el4.s390x", "4AS:thunderbird-0:1.5.0.12-25.el4.src", "4AS:thunderbird-0:1.5.0.12-25.el4.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4Desktop:thunderbird-0:1.5.0.12-25.el4.i386", "4Desktop:thunderbird-0:1.5.0.12-25.el4.ia64", "4Desktop:thunderbird-0:1.5.0.12-25.el4.ppc", "4Desktop:thunderbird-0:1.5.0.12-25.el4.s390", "4Desktop:thunderbird-0:1.5.0.12-25.el4.s390x", "4Desktop:thunderbird-0:1.5.0.12-25.el4.src", "4Desktop:thunderbird-0:1.5.0.12-25.el4.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4ES:thunderbird-0:1.5.0.12-25.el4.i386", "4ES:thunderbird-0:1.5.0.12-25.el4.ia64", "4ES:thunderbird-0:1.5.0.12-25.el4.ppc", "4ES:thunderbird-0:1.5.0.12-25.el4.s390", "4ES:thunderbird-0:1.5.0.12-25.el4.s390x", "4ES:thunderbird-0:1.5.0.12-25.el4.src", "4ES:thunderbird-0:1.5.0.12-25.el4.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4WS:thunderbird-0:1.5.0.12-25.el4.i386", "4WS:thunderbird-0:1.5.0.12-25.el4.ia64", "4WS:thunderbird-0:1.5.0.12-25.el4.ppc", "4WS:thunderbird-0:1.5.0.12-25.el4.s390", "4WS:thunderbird-0:1.5.0.12-25.el4.s390x", "4WS:thunderbird-0:1.5.0.12-25.el4.src", "4WS:thunderbird-0:1.5.0.12-25.el4.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "Firefox 3.5.3 3.0.14 browser engine crashes" }, { "cve": "CVE-2009-3075", "discovery_date": "2009-09-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "521691" } ], "notes": [ { "category": "description", "text": "Multiple unspecified vulnerabilities in the JavaScript engine in Mozilla Firefox before 3.0.14 and 3.5.x before 3.5.2, Thunderbird before 2.0.0.24, and SeaMonkey before 1.1.19 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to use of mutable strings in the js_StringReplaceHelper function in js/src/jsstr.cpp, and unknown vectors.", "title": "Vulnerability description" }, { "category": "summary", "text": "Firefox 3.5.2 3.0.14 JavaScript engine crashes", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS:thunderbird-0:1.5.0.12-25.el4.i386", "4AS:thunderbird-0:1.5.0.12-25.el4.ia64", "4AS:thunderbird-0:1.5.0.12-25.el4.ppc", "4AS:thunderbird-0:1.5.0.12-25.el4.s390", "4AS:thunderbird-0:1.5.0.12-25.el4.s390x", "4AS:thunderbird-0:1.5.0.12-25.el4.src", "4AS:thunderbird-0:1.5.0.12-25.el4.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4Desktop:thunderbird-0:1.5.0.12-25.el4.i386", "4Desktop:thunderbird-0:1.5.0.12-25.el4.ia64", "4Desktop:thunderbird-0:1.5.0.12-25.el4.ppc", "4Desktop:thunderbird-0:1.5.0.12-25.el4.s390", "4Desktop:thunderbird-0:1.5.0.12-25.el4.s390x", "4Desktop:thunderbird-0:1.5.0.12-25.el4.src", "4Desktop:thunderbird-0:1.5.0.12-25.el4.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4ES:thunderbird-0:1.5.0.12-25.el4.i386", "4ES:thunderbird-0:1.5.0.12-25.el4.ia64", "4ES:thunderbird-0:1.5.0.12-25.el4.ppc", "4ES:thunderbird-0:1.5.0.12-25.el4.s390", "4ES:thunderbird-0:1.5.0.12-25.el4.s390x", "4ES:thunderbird-0:1.5.0.12-25.el4.src", "4ES:thunderbird-0:1.5.0.12-25.el4.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4WS:thunderbird-0:1.5.0.12-25.el4.i386", "4WS:thunderbird-0:1.5.0.12-25.el4.ia64", "4WS:thunderbird-0:1.5.0.12-25.el4.ppc", "4WS:thunderbird-0:1.5.0.12-25.el4.s390", "4WS:thunderbird-0:1.5.0.12-25.el4.s390x", "4WS:thunderbird-0:1.5.0.12-25.el4.src", "4WS:thunderbird-0:1.5.0.12-25.el4.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-3075" }, { "category": "external", "summary": "RHBZ#521691", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=521691" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3075", "url": "https://www.cve.org/CVERecord?id=CVE-2009-3075" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3075", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3075" } ], "release_date": "2009-09-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-03-17T13:04:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS:thunderbird-0:1.5.0.12-25.el4.i386", "4AS:thunderbird-0:1.5.0.12-25.el4.ia64", "4AS:thunderbird-0:1.5.0.12-25.el4.ppc", "4AS:thunderbird-0:1.5.0.12-25.el4.s390", "4AS:thunderbird-0:1.5.0.12-25.el4.s390x", "4AS:thunderbird-0:1.5.0.12-25.el4.src", "4AS:thunderbird-0:1.5.0.12-25.el4.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4Desktop:thunderbird-0:1.5.0.12-25.el4.i386", "4Desktop:thunderbird-0:1.5.0.12-25.el4.ia64", "4Desktop:thunderbird-0:1.5.0.12-25.el4.ppc", "4Desktop:thunderbird-0:1.5.0.12-25.el4.s390", "4Desktop:thunderbird-0:1.5.0.12-25.el4.s390x", "4Desktop:thunderbird-0:1.5.0.12-25.el4.src", "4Desktop:thunderbird-0:1.5.0.12-25.el4.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4ES:thunderbird-0:1.5.0.12-25.el4.i386", "4ES:thunderbird-0:1.5.0.12-25.el4.ia64", "4ES:thunderbird-0:1.5.0.12-25.el4.ppc", "4ES:thunderbird-0:1.5.0.12-25.el4.s390", "4ES:thunderbird-0:1.5.0.12-25.el4.s390x", "4ES:thunderbird-0:1.5.0.12-25.el4.src", "4ES:thunderbird-0:1.5.0.12-25.el4.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4WS:thunderbird-0:1.5.0.12-25.el4.i386", "4WS:thunderbird-0:1.5.0.12-25.el4.ia64", "4WS:thunderbird-0:1.5.0.12-25.el4.ppc", "4WS:thunderbird-0:1.5.0.12-25.el4.s390", "4WS:thunderbird-0:1.5.0.12-25.el4.s390x", "4WS:thunderbird-0:1.5.0.12-25.el4.src", "4WS:thunderbird-0:1.5.0.12-25.el4.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0154" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS:thunderbird-0:1.5.0.12-25.el4.i386", "4AS:thunderbird-0:1.5.0.12-25.el4.ia64", "4AS:thunderbird-0:1.5.0.12-25.el4.ppc", "4AS:thunderbird-0:1.5.0.12-25.el4.s390", "4AS:thunderbird-0:1.5.0.12-25.el4.s390x", "4AS:thunderbird-0:1.5.0.12-25.el4.src", "4AS:thunderbird-0:1.5.0.12-25.el4.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4Desktop:thunderbird-0:1.5.0.12-25.el4.i386", "4Desktop:thunderbird-0:1.5.0.12-25.el4.ia64", "4Desktop:thunderbird-0:1.5.0.12-25.el4.ppc", "4Desktop:thunderbird-0:1.5.0.12-25.el4.s390", "4Desktop:thunderbird-0:1.5.0.12-25.el4.s390x", "4Desktop:thunderbird-0:1.5.0.12-25.el4.src", "4Desktop:thunderbird-0:1.5.0.12-25.el4.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4ES:thunderbird-0:1.5.0.12-25.el4.i386", "4ES:thunderbird-0:1.5.0.12-25.el4.ia64", "4ES:thunderbird-0:1.5.0.12-25.el4.ppc", "4ES:thunderbird-0:1.5.0.12-25.el4.s390", "4ES:thunderbird-0:1.5.0.12-25.el4.s390x", "4ES:thunderbird-0:1.5.0.12-25.el4.src", "4ES:thunderbird-0:1.5.0.12-25.el4.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4WS:thunderbird-0:1.5.0.12-25.el4.i386", "4WS:thunderbird-0:1.5.0.12-25.el4.ia64", "4WS:thunderbird-0:1.5.0.12-25.el4.ppc", "4WS:thunderbird-0:1.5.0.12-25.el4.s390", "4WS:thunderbird-0:1.5.0.12-25.el4.s390x", "4WS:thunderbird-0:1.5.0.12-25.el4.src", "4WS:thunderbird-0:1.5.0.12-25.el4.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "Firefox 3.5.2 3.0.14 JavaScript engine crashes" }, { "cve": "CVE-2009-3076", "discovery_date": "2009-09-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "521692" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox before 3.0.14 does not properly implement certain dialogs associated with the (1) pkcs11.addmodule and (2) pkcs11.deletemodule operations, which makes it easier for remote attackers to trick a user into installing or removing an arbitrary PKCS11 module.", "title": "Vulnerability description" }, { "category": "summary", "text": "Firefox 3.0.14 Insufficient warning for PKCS11 module installation and removal", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS:thunderbird-0:1.5.0.12-25.el4.i386", "4AS:thunderbird-0:1.5.0.12-25.el4.ia64", "4AS:thunderbird-0:1.5.0.12-25.el4.ppc", "4AS:thunderbird-0:1.5.0.12-25.el4.s390", "4AS:thunderbird-0:1.5.0.12-25.el4.s390x", "4AS:thunderbird-0:1.5.0.12-25.el4.src", "4AS:thunderbird-0:1.5.0.12-25.el4.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4Desktop:thunderbird-0:1.5.0.12-25.el4.i386", "4Desktop:thunderbird-0:1.5.0.12-25.el4.ia64", "4Desktop:thunderbird-0:1.5.0.12-25.el4.ppc", "4Desktop:thunderbird-0:1.5.0.12-25.el4.s390", "4Desktop:thunderbird-0:1.5.0.12-25.el4.s390x", "4Desktop:thunderbird-0:1.5.0.12-25.el4.src", "4Desktop:thunderbird-0:1.5.0.12-25.el4.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4ES:thunderbird-0:1.5.0.12-25.el4.i386", "4ES:thunderbird-0:1.5.0.12-25.el4.ia64", "4ES:thunderbird-0:1.5.0.12-25.el4.ppc", "4ES:thunderbird-0:1.5.0.12-25.el4.s390", "4ES:thunderbird-0:1.5.0.12-25.el4.s390x", "4ES:thunderbird-0:1.5.0.12-25.el4.src", "4ES:thunderbird-0:1.5.0.12-25.el4.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4WS:thunderbird-0:1.5.0.12-25.el4.i386", "4WS:thunderbird-0:1.5.0.12-25.el4.ia64", "4WS:thunderbird-0:1.5.0.12-25.el4.ppc", "4WS:thunderbird-0:1.5.0.12-25.el4.s390", "4WS:thunderbird-0:1.5.0.12-25.el4.s390x", "4WS:thunderbird-0:1.5.0.12-25.el4.src", "4WS:thunderbird-0:1.5.0.12-25.el4.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-3076" }, { "category": "external", "summary": "RHBZ#521692", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=521692" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3076", "url": "https://www.cve.org/CVERecord?id=CVE-2009-3076" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3076", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3076" } ], "release_date": "2009-09-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-03-17T13:04:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS:thunderbird-0:1.5.0.12-25.el4.i386", "4AS:thunderbird-0:1.5.0.12-25.el4.ia64", "4AS:thunderbird-0:1.5.0.12-25.el4.ppc", "4AS:thunderbird-0:1.5.0.12-25.el4.s390", "4AS:thunderbird-0:1.5.0.12-25.el4.s390x", "4AS:thunderbird-0:1.5.0.12-25.el4.src", "4AS:thunderbird-0:1.5.0.12-25.el4.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4Desktop:thunderbird-0:1.5.0.12-25.el4.i386", "4Desktop:thunderbird-0:1.5.0.12-25.el4.ia64", "4Desktop:thunderbird-0:1.5.0.12-25.el4.ppc", "4Desktop:thunderbird-0:1.5.0.12-25.el4.s390", "4Desktop:thunderbird-0:1.5.0.12-25.el4.s390x", "4Desktop:thunderbird-0:1.5.0.12-25.el4.src", "4Desktop:thunderbird-0:1.5.0.12-25.el4.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4ES:thunderbird-0:1.5.0.12-25.el4.i386", "4ES:thunderbird-0:1.5.0.12-25.el4.ia64", "4ES:thunderbird-0:1.5.0.12-25.el4.ppc", "4ES:thunderbird-0:1.5.0.12-25.el4.s390", "4ES:thunderbird-0:1.5.0.12-25.el4.s390x", "4ES:thunderbird-0:1.5.0.12-25.el4.src", "4ES:thunderbird-0:1.5.0.12-25.el4.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4WS:thunderbird-0:1.5.0.12-25.el4.i386", "4WS:thunderbird-0:1.5.0.12-25.el4.ia64", "4WS:thunderbird-0:1.5.0.12-25.el4.ppc", "4WS:thunderbird-0:1.5.0.12-25.el4.s390", "4WS:thunderbird-0:1.5.0.12-25.el4.s390x", "4WS:thunderbird-0:1.5.0.12-25.el4.src", "4WS:thunderbird-0:1.5.0.12-25.el4.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0154" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "4AS:thunderbird-0:1.5.0.12-25.el4.i386", "4AS:thunderbird-0:1.5.0.12-25.el4.ia64", "4AS:thunderbird-0:1.5.0.12-25.el4.ppc", "4AS:thunderbird-0:1.5.0.12-25.el4.s390", "4AS:thunderbird-0:1.5.0.12-25.el4.s390x", "4AS:thunderbird-0:1.5.0.12-25.el4.src", "4AS:thunderbird-0:1.5.0.12-25.el4.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4Desktop:thunderbird-0:1.5.0.12-25.el4.i386", "4Desktop:thunderbird-0:1.5.0.12-25.el4.ia64", "4Desktop:thunderbird-0:1.5.0.12-25.el4.ppc", "4Desktop:thunderbird-0:1.5.0.12-25.el4.s390", "4Desktop:thunderbird-0:1.5.0.12-25.el4.s390x", "4Desktop:thunderbird-0:1.5.0.12-25.el4.src", "4Desktop:thunderbird-0:1.5.0.12-25.el4.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4ES:thunderbird-0:1.5.0.12-25.el4.i386", "4ES:thunderbird-0:1.5.0.12-25.el4.ia64", "4ES:thunderbird-0:1.5.0.12-25.el4.ppc", "4ES:thunderbird-0:1.5.0.12-25.el4.s390", "4ES:thunderbird-0:1.5.0.12-25.el4.s390x", "4ES:thunderbird-0:1.5.0.12-25.el4.src", "4ES:thunderbird-0:1.5.0.12-25.el4.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4WS:thunderbird-0:1.5.0.12-25.el4.i386", "4WS:thunderbird-0:1.5.0.12-25.el4.ia64", "4WS:thunderbird-0:1.5.0.12-25.el4.ppc", "4WS:thunderbird-0:1.5.0.12-25.el4.s390", "4WS:thunderbird-0:1.5.0.12-25.el4.s390x", "4WS:thunderbird-0:1.5.0.12-25.el4.src", "4WS:thunderbird-0:1.5.0.12-25.el4.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Firefox 3.0.14 Insufficient warning for PKCS11 module installation and removal" }, { "cve": "CVE-2009-3077", "discovery_date": "2009-09-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "521693" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox before 3.0.14, and 3.5.x before 3.5.3, does not properly manage pointers for the columns (aka TreeColumns) of a XUL tree element, which allows remote attackers to execute arbitrary code via a crafted HTML document, related to a \"dangling pointer vulnerability.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "Firefox 3.5.3 3.0.14 TreeColumns dangling pointer vulnerability", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS:thunderbird-0:1.5.0.12-25.el4.i386", "4AS:thunderbird-0:1.5.0.12-25.el4.ia64", "4AS:thunderbird-0:1.5.0.12-25.el4.ppc", "4AS:thunderbird-0:1.5.0.12-25.el4.s390", "4AS:thunderbird-0:1.5.0.12-25.el4.s390x", "4AS:thunderbird-0:1.5.0.12-25.el4.src", "4AS:thunderbird-0:1.5.0.12-25.el4.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4Desktop:thunderbird-0:1.5.0.12-25.el4.i386", "4Desktop:thunderbird-0:1.5.0.12-25.el4.ia64", "4Desktop:thunderbird-0:1.5.0.12-25.el4.ppc", "4Desktop:thunderbird-0:1.5.0.12-25.el4.s390", "4Desktop:thunderbird-0:1.5.0.12-25.el4.s390x", "4Desktop:thunderbird-0:1.5.0.12-25.el4.src", "4Desktop:thunderbird-0:1.5.0.12-25.el4.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4ES:thunderbird-0:1.5.0.12-25.el4.i386", "4ES:thunderbird-0:1.5.0.12-25.el4.ia64", "4ES:thunderbird-0:1.5.0.12-25.el4.ppc", "4ES:thunderbird-0:1.5.0.12-25.el4.s390", "4ES:thunderbird-0:1.5.0.12-25.el4.s390x", "4ES:thunderbird-0:1.5.0.12-25.el4.src", "4ES:thunderbird-0:1.5.0.12-25.el4.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4WS:thunderbird-0:1.5.0.12-25.el4.i386", "4WS:thunderbird-0:1.5.0.12-25.el4.ia64", "4WS:thunderbird-0:1.5.0.12-25.el4.ppc", "4WS:thunderbird-0:1.5.0.12-25.el4.s390", "4WS:thunderbird-0:1.5.0.12-25.el4.s390x", "4WS:thunderbird-0:1.5.0.12-25.el4.src", "4WS:thunderbird-0:1.5.0.12-25.el4.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-3077" }, { "category": "external", "summary": "RHBZ#521693", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=521693" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3077", "url": "https://www.cve.org/CVERecord?id=CVE-2009-3077" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3077", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3077" } ], "release_date": "2009-09-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-03-17T13:04:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS:thunderbird-0:1.5.0.12-25.el4.i386", "4AS:thunderbird-0:1.5.0.12-25.el4.ia64", "4AS:thunderbird-0:1.5.0.12-25.el4.ppc", "4AS:thunderbird-0:1.5.0.12-25.el4.s390", "4AS:thunderbird-0:1.5.0.12-25.el4.s390x", "4AS:thunderbird-0:1.5.0.12-25.el4.src", "4AS:thunderbird-0:1.5.0.12-25.el4.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4Desktop:thunderbird-0:1.5.0.12-25.el4.i386", "4Desktop:thunderbird-0:1.5.0.12-25.el4.ia64", "4Desktop:thunderbird-0:1.5.0.12-25.el4.ppc", "4Desktop:thunderbird-0:1.5.0.12-25.el4.s390", "4Desktop:thunderbird-0:1.5.0.12-25.el4.s390x", "4Desktop:thunderbird-0:1.5.0.12-25.el4.src", "4Desktop:thunderbird-0:1.5.0.12-25.el4.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4ES:thunderbird-0:1.5.0.12-25.el4.i386", "4ES:thunderbird-0:1.5.0.12-25.el4.ia64", "4ES:thunderbird-0:1.5.0.12-25.el4.ppc", "4ES:thunderbird-0:1.5.0.12-25.el4.s390", "4ES:thunderbird-0:1.5.0.12-25.el4.s390x", "4ES:thunderbird-0:1.5.0.12-25.el4.src", "4ES:thunderbird-0:1.5.0.12-25.el4.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4WS:thunderbird-0:1.5.0.12-25.el4.i386", "4WS:thunderbird-0:1.5.0.12-25.el4.ia64", "4WS:thunderbird-0:1.5.0.12-25.el4.ppc", "4WS:thunderbird-0:1.5.0.12-25.el4.s390", "4WS:thunderbird-0:1.5.0.12-25.el4.s390x", "4WS:thunderbird-0:1.5.0.12-25.el4.src", "4WS:thunderbird-0:1.5.0.12-25.el4.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0154" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS:thunderbird-0:1.5.0.12-25.el4.i386", "4AS:thunderbird-0:1.5.0.12-25.el4.ia64", "4AS:thunderbird-0:1.5.0.12-25.el4.ppc", "4AS:thunderbird-0:1.5.0.12-25.el4.s390", "4AS:thunderbird-0:1.5.0.12-25.el4.s390x", "4AS:thunderbird-0:1.5.0.12-25.el4.src", "4AS:thunderbird-0:1.5.0.12-25.el4.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4Desktop:thunderbird-0:1.5.0.12-25.el4.i386", "4Desktop:thunderbird-0:1.5.0.12-25.el4.ia64", "4Desktop:thunderbird-0:1.5.0.12-25.el4.ppc", "4Desktop:thunderbird-0:1.5.0.12-25.el4.s390", "4Desktop:thunderbird-0:1.5.0.12-25.el4.s390x", "4Desktop:thunderbird-0:1.5.0.12-25.el4.src", "4Desktop:thunderbird-0:1.5.0.12-25.el4.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4ES:thunderbird-0:1.5.0.12-25.el4.i386", "4ES:thunderbird-0:1.5.0.12-25.el4.ia64", "4ES:thunderbird-0:1.5.0.12-25.el4.ppc", "4ES:thunderbird-0:1.5.0.12-25.el4.s390", "4ES:thunderbird-0:1.5.0.12-25.el4.s390x", "4ES:thunderbird-0:1.5.0.12-25.el4.src", "4ES:thunderbird-0:1.5.0.12-25.el4.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4WS:thunderbird-0:1.5.0.12-25.el4.i386", "4WS:thunderbird-0:1.5.0.12-25.el4.ia64", "4WS:thunderbird-0:1.5.0.12-25.el4.ppc", "4WS:thunderbird-0:1.5.0.12-25.el4.s390", "4WS:thunderbird-0:1.5.0.12-25.el4.s390x", "4WS:thunderbird-0:1.5.0.12-25.el4.src", "4WS:thunderbird-0:1.5.0.12-25.el4.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "Firefox 3.5.3 3.0.14 TreeColumns dangling pointer vulnerability" }, { "cve": "CVE-2009-3274", "discovery_date": "2009-09-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "524815" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox 3.6a1, 3.5.3, 3.5.2, and earlier 3.5.x versions, and 3.0.14 and earlier 2.x and 3.x versions, on Linux uses a predictable /tmp pathname for files selected from the Downloads window, which allows local users to replace an arbitrary downloaded file by placing a file in a /tmp location before the download occurs, related to the Download Manager component. NOTE: some of these details are obtained from third party information.", "title": "Vulnerability description" }, { "category": "summary", "text": "Firefox: Predictable /tmp pathname use", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS:thunderbird-0:1.5.0.12-25.el4.i386", "4AS:thunderbird-0:1.5.0.12-25.el4.ia64", "4AS:thunderbird-0:1.5.0.12-25.el4.ppc", "4AS:thunderbird-0:1.5.0.12-25.el4.s390", "4AS:thunderbird-0:1.5.0.12-25.el4.s390x", "4AS:thunderbird-0:1.5.0.12-25.el4.src", "4AS:thunderbird-0:1.5.0.12-25.el4.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4Desktop:thunderbird-0:1.5.0.12-25.el4.i386", "4Desktop:thunderbird-0:1.5.0.12-25.el4.ia64", "4Desktop:thunderbird-0:1.5.0.12-25.el4.ppc", "4Desktop:thunderbird-0:1.5.0.12-25.el4.s390", "4Desktop:thunderbird-0:1.5.0.12-25.el4.s390x", "4Desktop:thunderbird-0:1.5.0.12-25.el4.src", "4Desktop:thunderbird-0:1.5.0.12-25.el4.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4ES:thunderbird-0:1.5.0.12-25.el4.i386", "4ES:thunderbird-0:1.5.0.12-25.el4.ia64", "4ES:thunderbird-0:1.5.0.12-25.el4.ppc", "4ES:thunderbird-0:1.5.0.12-25.el4.s390", "4ES:thunderbird-0:1.5.0.12-25.el4.s390x", "4ES:thunderbird-0:1.5.0.12-25.el4.src", "4ES:thunderbird-0:1.5.0.12-25.el4.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4WS:thunderbird-0:1.5.0.12-25.el4.i386", "4WS:thunderbird-0:1.5.0.12-25.el4.ia64", "4WS:thunderbird-0:1.5.0.12-25.el4.ppc", "4WS:thunderbird-0:1.5.0.12-25.el4.s390", "4WS:thunderbird-0:1.5.0.12-25.el4.s390x", "4WS:thunderbird-0:1.5.0.12-25.el4.src", "4WS:thunderbird-0:1.5.0.12-25.el4.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-3274" }, { "category": "external", "summary": "RHBZ#524815", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=524815" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3274", "url": "https://www.cve.org/CVERecord?id=CVE-2009-3274" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3274", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3274" } ], "release_date": "2009-09-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-03-17T13:04:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS:thunderbird-0:1.5.0.12-25.el4.i386", "4AS:thunderbird-0:1.5.0.12-25.el4.ia64", "4AS:thunderbird-0:1.5.0.12-25.el4.ppc", "4AS:thunderbird-0:1.5.0.12-25.el4.s390", "4AS:thunderbird-0:1.5.0.12-25.el4.s390x", "4AS:thunderbird-0:1.5.0.12-25.el4.src", "4AS:thunderbird-0:1.5.0.12-25.el4.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4Desktop:thunderbird-0:1.5.0.12-25.el4.i386", "4Desktop:thunderbird-0:1.5.0.12-25.el4.ia64", "4Desktop:thunderbird-0:1.5.0.12-25.el4.ppc", "4Desktop:thunderbird-0:1.5.0.12-25.el4.s390", "4Desktop:thunderbird-0:1.5.0.12-25.el4.s390x", "4Desktop:thunderbird-0:1.5.0.12-25.el4.src", "4Desktop:thunderbird-0:1.5.0.12-25.el4.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4ES:thunderbird-0:1.5.0.12-25.el4.i386", "4ES:thunderbird-0:1.5.0.12-25.el4.ia64", "4ES:thunderbird-0:1.5.0.12-25.el4.ppc", "4ES:thunderbird-0:1.5.0.12-25.el4.s390", "4ES:thunderbird-0:1.5.0.12-25.el4.s390x", "4ES:thunderbird-0:1.5.0.12-25.el4.src", "4ES:thunderbird-0:1.5.0.12-25.el4.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4WS:thunderbird-0:1.5.0.12-25.el4.i386", "4WS:thunderbird-0:1.5.0.12-25.el4.ia64", "4WS:thunderbird-0:1.5.0.12-25.el4.ppc", "4WS:thunderbird-0:1.5.0.12-25.el4.s390", "4WS:thunderbird-0:1.5.0.12-25.el4.s390x", "4WS:thunderbird-0:1.5.0.12-25.el4.src", "4WS:thunderbird-0:1.5.0.12-25.el4.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0154" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 3.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, "products": [ "4AS:thunderbird-0:1.5.0.12-25.el4.i386", "4AS:thunderbird-0:1.5.0.12-25.el4.ia64", "4AS:thunderbird-0:1.5.0.12-25.el4.ppc", "4AS:thunderbird-0:1.5.0.12-25.el4.s390", "4AS:thunderbird-0:1.5.0.12-25.el4.s390x", "4AS:thunderbird-0:1.5.0.12-25.el4.src", "4AS:thunderbird-0:1.5.0.12-25.el4.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4Desktop:thunderbird-0:1.5.0.12-25.el4.i386", "4Desktop:thunderbird-0:1.5.0.12-25.el4.ia64", "4Desktop:thunderbird-0:1.5.0.12-25.el4.ppc", "4Desktop:thunderbird-0:1.5.0.12-25.el4.s390", "4Desktop:thunderbird-0:1.5.0.12-25.el4.s390x", "4Desktop:thunderbird-0:1.5.0.12-25.el4.src", "4Desktop:thunderbird-0:1.5.0.12-25.el4.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4ES:thunderbird-0:1.5.0.12-25.el4.i386", "4ES:thunderbird-0:1.5.0.12-25.el4.ia64", "4ES:thunderbird-0:1.5.0.12-25.el4.ppc", "4ES:thunderbird-0:1.5.0.12-25.el4.s390", "4ES:thunderbird-0:1.5.0.12-25.el4.s390x", "4ES:thunderbird-0:1.5.0.12-25.el4.src", "4ES:thunderbird-0:1.5.0.12-25.el4.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4WS:thunderbird-0:1.5.0.12-25.el4.i386", "4WS:thunderbird-0:1.5.0.12-25.el4.ia64", "4WS:thunderbird-0:1.5.0.12-25.el4.ppc", "4WS:thunderbird-0:1.5.0.12-25.el4.s390", "4WS:thunderbird-0:1.5.0.12-25.el4.s390x", "4WS:thunderbird-0:1.5.0.12-25.el4.src", "4WS:thunderbird-0:1.5.0.12-25.el4.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Firefox: Predictable /tmp pathname use" }, { "cve": "CVE-2009-3376", "discovery_date": "2009-10-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "530168" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox before 3.0.15 and 3.5.x before 3.5.4, and SeaMonkey before 2.0, does not properly handle a right-to-left override (aka RLO or U+202E) Unicode character in a download filename, which allows remote attackers to spoof file extensions via a crafted filename, as demonstrated by displaying a non-executable extension for an executable file.", "title": "Vulnerability description" }, { "category": "summary", "text": "Firefox download filename spoofing with RTL override", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS:thunderbird-0:1.5.0.12-25.el4.i386", "4AS:thunderbird-0:1.5.0.12-25.el4.ia64", "4AS:thunderbird-0:1.5.0.12-25.el4.ppc", "4AS:thunderbird-0:1.5.0.12-25.el4.s390", "4AS:thunderbird-0:1.5.0.12-25.el4.s390x", "4AS:thunderbird-0:1.5.0.12-25.el4.src", "4AS:thunderbird-0:1.5.0.12-25.el4.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4Desktop:thunderbird-0:1.5.0.12-25.el4.i386", "4Desktop:thunderbird-0:1.5.0.12-25.el4.ia64", "4Desktop:thunderbird-0:1.5.0.12-25.el4.ppc", "4Desktop:thunderbird-0:1.5.0.12-25.el4.s390", "4Desktop:thunderbird-0:1.5.0.12-25.el4.s390x", "4Desktop:thunderbird-0:1.5.0.12-25.el4.src", "4Desktop:thunderbird-0:1.5.0.12-25.el4.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4ES:thunderbird-0:1.5.0.12-25.el4.i386", "4ES:thunderbird-0:1.5.0.12-25.el4.ia64", "4ES:thunderbird-0:1.5.0.12-25.el4.ppc", "4ES:thunderbird-0:1.5.0.12-25.el4.s390", "4ES:thunderbird-0:1.5.0.12-25.el4.s390x", "4ES:thunderbird-0:1.5.0.12-25.el4.src", "4ES:thunderbird-0:1.5.0.12-25.el4.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4WS:thunderbird-0:1.5.0.12-25.el4.i386", "4WS:thunderbird-0:1.5.0.12-25.el4.ia64", "4WS:thunderbird-0:1.5.0.12-25.el4.ppc", "4WS:thunderbird-0:1.5.0.12-25.el4.s390", "4WS:thunderbird-0:1.5.0.12-25.el4.s390x", "4WS:thunderbird-0:1.5.0.12-25.el4.src", "4WS:thunderbird-0:1.5.0.12-25.el4.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-3376" }, { "category": "external", "summary": "RHBZ#530168", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=530168" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3376", "url": "https://www.cve.org/CVERecord?id=CVE-2009-3376" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3376", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3376" } ], "release_date": "2009-10-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-03-17T13:04:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS:thunderbird-0:1.5.0.12-25.el4.i386", "4AS:thunderbird-0:1.5.0.12-25.el4.ia64", "4AS:thunderbird-0:1.5.0.12-25.el4.ppc", "4AS:thunderbird-0:1.5.0.12-25.el4.s390", "4AS:thunderbird-0:1.5.0.12-25.el4.s390x", "4AS:thunderbird-0:1.5.0.12-25.el4.src", "4AS:thunderbird-0:1.5.0.12-25.el4.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4Desktop:thunderbird-0:1.5.0.12-25.el4.i386", "4Desktop:thunderbird-0:1.5.0.12-25.el4.ia64", "4Desktop:thunderbird-0:1.5.0.12-25.el4.ppc", "4Desktop:thunderbird-0:1.5.0.12-25.el4.s390", "4Desktop:thunderbird-0:1.5.0.12-25.el4.s390x", "4Desktop:thunderbird-0:1.5.0.12-25.el4.src", "4Desktop:thunderbird-0:1.5.0.12-25.el4.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4ES:thunderbird-0:1.5.0.12-25.el4.i386", "4ES:thunderbird-0:1.5.0.12-25.el4.ia64", "4ES:thunderbird-0:1.5.0.12-25.el4.ppc", "4ES:thunderbird-0:1.5.0.12-25.el4.s390", "4ES:thunderbird-0:1.5.0.12-25.el4.s390x", "4ES:thunderbird-0:1.5.0.12-25.el4.src", "4ES:thunderbird-0:1.5.0.12-25.el4.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4WS:thunderbird-0:1.5.0.12-25.el4.i386", "4WS:thunderbird-0:1.5.0.12-25.el4.ia64", "4WS:thunderbird-0:1.5.0.12-25.el4.ppc", "4WS:thunderbird-0:1.5.0.12-25.el4.s390", "4WS:thunderbird-0:1.5.0.12-25.el4.s390x", "4WS:thunderbird-0:1.5.0.12-25.el4.src", "4WS:thunderbird-0:1.5.0.12-25.el4.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0154" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.6, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "4AS:thunderbird-0:1.5.0.12-25.el4.i386", "4AS:thunderbird-0:1.5.0.12-25.el4.ia64", "4AS:thunderbird-0:1.5.0.12-25.el4.ppc", "4AS:thunderbird-0:1.5.0.12-25.el4.s390", "4AS:thunderbird-0:1.5.0.12-25.el4.s390x", "4AS:thunderbird-0:1.5.0.12-25.el4.src", "4AS:thunderbird-0:1.5.0.12-25.el4.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4Desktop:thunderbird-0:1.5.0.12-25.el4.i386", "4Desktop:thunderbird-0:1.5.0.12-25.el4.ia64", "4Desktop:thunderbird-0:1.5.0.12-25.el4.ppc", "4Desktop:thunderbird-0:1.5.0.12-25.el4.s390", "4Desktop:thunderbird-0:1.5.0.12-25.el4.s390x", "4Desktop:thunderbird-0:1.5.0.12-25.el4.src", "4Desktop:thunderbird-0:1.5.0.12-25.el4.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4ES:thunderbird-0:1.5.0.12-25.el4.i386", "4ES:thunderbird-0:1.5.0.12-25.el4.ia64", "4ES:thunderbird-0:1.5.0.12-25.el4.ppc", "4ES:thunderbird-0:1.5.0.12-25.el4.s390", "4ES:thunderbird-0:1.5.0.12-25.el4.s390x", "4ES:thunderbird-0:1.5.0.12-25.el4.src", "4ES:thunderbird-0:1.5.0.12-25.el4.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4WS:thunderbird-0:1.5.0.12-25.el4.i386", "4WS:thunderbird-0:1.5.0.12-25.el4.ia64", "4WS:thunderbird-0:1.5.0.12-25.el4.ppc", "4WS:thunderbird-0:1.5.0.12-25.el4.s390", "4WS:thunderbird-0:1.5.0.12-25.el4.s390x", "4WS:thunderbird-0:1.5.0.12-25.el4.src", "4WS:thunderbird-0:1.5.0.12-25.el4.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "Firefox download filename spoofing with RTL override" }, { "cve": "CVE-2009-3380", "discovery_date": "2009-10-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "530567" } ], "notes": [ { "category": "description", "text": "Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 3.0.x before 3.0.15 and 3.5.x before 3.5.4 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.", "title": "Vulnerability description" }, { "category": "summary", "text": "Firefox crashes with evidence of memory corruption", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS:thunderbird-0:1.5.0.12-25.el4.i386", "4AS:thunderbird-0:1.5.0.12-25.el4.ia64", "4AS:thunderbird-0:1.5.0.12-25.el4.ppc", "4AS:thunderbird-0:1.5.0.12-25.el4.s390", "4AS:thunderbird-0:1.5.0.12-25.el4.s390x", "4AS:thunderbird-0:1.5.0.12-25.el4.src", "4AS:thunderbird-0:1.5.0.12-25.el4.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4Desktop:thunderbird-0:1.5.0.12-25.el4.i386", "4Desktop:thunderbird-0:1.5.0.12-25.el4.ia64", "4Desktop:thunderbird-0:1.5.0.12-25.el4.ppc", "4Desktop:thunderbird-0:1.5.0.12-25.el4.s390", "4Desktop:thunderbird-0:1.5.0.12-25.el4.s390x", "4Desktop:thunderbird-0:1.5.0.12-25.el4.src", "4Desktop:thunderbird-0:1.5.0.12-25.el4.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4ES:thunderbird-0:1.5.0.12-25.el4.i386", "4ES:thunderbird-0:1.5.0.12-25.el4.ia64", "4ES:thunderbird-0:1.5.0.12-25.el4.ppc", "4ES:thunderbird-0:1.5.0.12-25.el4.s390", "4ES:thunderbird-0:1.5.0.12-25.el4.s390x", "4ES:thunderbird-0:1.5.0.12-25.el4.src", "4ES:thunderbird-0:1.5.0.12-25.el4.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4WS:thunderbird-0:1.5.0.12-25.el4.i386", "4WS:thunderbird-0:1.5.0.12-25.el4.ia64", "4WS:thunderbird-0:1.5.0.12-25.el4.ppc", "4WS:thunderbird-0:1.5.0.12-25.el4.s390", "4WS:thunderbird-0:1.5.0.12-25.el4.s390x", "4WS:thunderbird-0:1.5.0.12-25.el4.src", "4WS:thunderbird-0:1.5.0.12-25.el4.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-3380" }, { "category": "external", "summary": "RHBZ#530567", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=530567" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3380", "url": "https://www.cve.org/CVERecord?id=CVE-2009-3380" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3380", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3380" } ], "release_date": "2009-10-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-03-17T13:04:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS:thunderbird-0:1.5.0.12-25.el4.i386", "4AS:thunderbird-0:1.5.0.12-25.el4.ia64", "4AS:thunderbird-0:1.5.0.12-25.el4.ppc", "4AS:thunderbird-0:1.5.0.12-25.el4.s390", "4AS:thunderbird-0:1.5.0.12-25.el4.s390x", "4AS:thunderbird-0:1.5.0.12-25.el4.src", "4AS:thunderbird-0:1.5.0.12-25.el4.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4Desktop:thunderbird-0:1.5.0.12-25.el4.i386", "4Desktop:thunderbird-0:1.5.0.12-25.el4.ia64", "4Desktop:thunderbird-0:1.5.0.12-25.el4.ppc", "4Desktop:thunderbird-0:1.5.0.12-25.el4.s390", "4Desktop:thunderbird-0:1.5.0.12-25.el4.s390x", "4Desktop:thunderbird-0:1.5.0.12-25.el4.src", "4Desktop:thunderbird-0:1.5.0.12-25.el4.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4ES:thunderbird-0:1.5.0.12-25.el4.i386", "4ES:thunderbird-0:1.5.0.12-25.el4.ia64", "4ES:thunderbird-0:1.5.0.12-25.el4.ppc", "4ES:thunderbird-0:1.5.0.12-25.el4.s390", "4ES:thunderbird-0:1.5.0.12-25.el4.s390x", "4ES:thunderbird-0:1.5.0.12-25.el4.src", "4ES:thunderbird-0:1.5.0.12-25.el4.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4WS:thunderbird-0:1.5.0.12-25.el4.i386", "4WS:thunderbird-0:1.5.0.12-25.el4.ia64", "4WS:thunderbird-0:1.5.0.12-25.el4.ppc", "4WS:thunderbird-0:1.5.0.12-25.el4.s390", "4WS:thunderbird-0:1.5.0.12-25.el4.s390x", "4WS:thunderbird-0:1.5.0.12-25.el4.src", "4WS:thunderbird-0:1.5.0.12-25.el4.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0154" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS:thunderbird-0:1.5.0.12-25.el4.i386", "4AS:thunderbird-0:1.5.0.12-25.el4.ia64", "4AS:thunderbird-0:1.5.0.12-25.el4.ppc", "4AS:thunderbird-0:1.5.0.12-25.el4.s390", "4AS:thunderbird-0:1.5.0.12-25.el4.s390x", "4AS:thunderbird-0:1.5.0.12-25.el4.src", "4AS:thunderbird-0:1.5.0.12-25.el4.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4Desktop:thunderbird-0:1.5.0.12-25.el4.i386", "4Desktop:thunderbird-0:1.5.0.12-25.el4.ia64", "4Desktop:thunderbird-0:1.5.0.12-25.el4.ppc", "4Desktop:thunderbird-0:1.5.0.12-25.el4.s390", "4Desktop:thunderbird-0:1.5.0.12-25.el4.s390x", "4Desktop:thunderbird-0:1.5.0.12-25.el4.src", "4Desktop:thunderbird-0:1.5.0.12-25.el4.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4ES:thunderbird-0:1.5.0.12-25.el4.i386", "4ES:thunderbird-0:1.5.0.12-25.el4.ia64", "4ES:thunderbird-0:1.5.0.12-25.el4.ppc", "4ES:thunderbird-0:1.5.0.12-25.el4.s390", "4ES:thunderbird-0:1.5.0.12-25.el4.s390x", "4ES:thunderbird-0:1.5.0.12-25.el4.src", "4ES:thunderbird-0:1.5.0.12-25.el4.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4WS:thunderbird-0:1.5.0.12-25.el4.i386", "4WS:thunderbird-0:1.5.0.12-25.el4.ia64", "4WS:thunderbird-0:1.5.0.12-25.el4.ppc", "4WS:thunderbird-0:1.5.0.12-25.el4.s390", "4WS:thunderbird-0:1.5.0.12-25.el4.s390x", "4WS:thunderbird-0:1.5.0.12-25.el4.src", "4WS:thunderbird-0:1.5.0.12-25.el4.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "Firefox crashes with evidence of memory corruption" }, { "cve": "CVE-2009-3384", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2009-10-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "530164" } ], "notes": [ { "category": "description", "text": "Multiple unspecified vulnerabilities in WebKit in Apple Safari before 4.0.4 on Windows allow remote FTP servers to execute arbitrary code, cause a denial of service (application crash), or obtain sensitive information via a crafted directory listing in a reply.", "title": "Vulnerability description" }, { "category": "summary", "text": "Firefox integer underflow in FTP directory list parser", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS:thunderbird-0:1.5.0.12-25.el4.i386", "4AS:thunderbird-0:1.5.0.12-25.el4.ia64", "4AS:thunderbird-0:1.5.0.12-25.el4.ppc", "4AS:thunderbird-0:1.5.0.12-25.el4.s390", "4AS:thunderbird-0:1.5.0.12-25.el4.s390x", "4AS:thunderbird-0:1.5.0.12-25.el4.src", "4AS:thunderbird-0:1.5.0.12-25.el4.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4Desktop:thunderbird-0:1.5.0.12-25.el4.i386", "4Desktop:thunderbird-0:1.5.0.12-25.el4.ia64", "4Desktop:thunderbird-0:1.5.0.12-25.el4.ppc", "4Desktop:thunderbird-0:1.5.0.12-25.el4.s390", "4Desktop:thunderbird-0:1.5.0.12-25.el4.s390x", "4Desktop:thunderbird-0:1.5.0.12-25.el4.src", "4Desktop:thunderbird-0:1.5.0.12-25.el4.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4ES:thunderbird-0:1.5.0.12-25.el4.i386", "4ES:thunderbird-0:1.5.0.12-25.el4.ia64", "4ES:thunderbird-0:1.5.0.12-25.el4.ppc", "4ES:thunderbird-0:1.5.0.12-25.el4.s390", "4ES:thunderbird-0:1.5.0.12-25.el4.s390x", "4ES:thunderbird-0:1.5.0.12-25.el4.src", "4ES:thunderbird-0:1.5.0.12-25.el4.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4WS:thunderbird-0:1.5.0.12-25.el4.i386", "4WS:thunderbird-0:1.5.0.12-25.el4.ia64", "4WS:thunderbird-0:1.5.0.12-25.el4.ppc", "4WS:thunderbird-0:1.5.0.12-25.el4.s390", "4WS:thunderbird-0:1.5.0.12-25.el4.s390x", "4WS:thunderbird-0:1.5.0.12-25.el4.src", "4WS:thunderbird-0:1.5.0.12-25.el4.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-3384" }, { "category": "external", "summary": "RHBZ#530164", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=530164" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3384", "url": "https://www.cve.org/CVERecord?id=CVE-2009-3384" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3384", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3384" } ], "release_date": "2009-10-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-03-17T13:04:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS:thunderbird-0:1.5.0.12-25.el4.i386", "4AS:thunderbird-0:1.5.0.12-25.el4.ia64", "4AS:thunderbird-0:1.5.0.12-25.el4.ppc", "4AS:thunderbird-0:1.5.0.12-25.el4.s390", "4AS:thunderbird-0:1.5.0.12-25.el4.s390x", "4AS:thunderbird-0:1.5.0.12-25.el4.src", "4AS:thunderbird-0:1.5.0.12-25.el4.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4Desktop:thunderbird-0:1.5.0.12-25.el4.i386", "4Desktop:thunderbird-0:1.5.0.12-25.el4.ia64", "4Desktop:thunderbird-0:1.5.0.12-25.el4.ppc", "4Desktop:thunderbird-0:1.5.0.12-25.el4.s390", "4Desktop:thunderbird-0:1.5.0.12-25.el4.s390x", "4Desktop:thunderbird-0:1.5.0.12-25.el4.src", "4Desktop:thunderbird-0:1.5.0.12-25.el4.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4ES:thunderbird-0:1.5.0.12-25.el4.i386", "4ES:thunderbird-0:1.5.0.12-25.el4.ia64", "4ES:thunderbird-0:1.5.0.12-25.el4.ppc", "4ES:thunderbird-0:1.5.0.12-25.el4.s390", "4ES:thunderbird-0:1.5.0.12-25.el4.s390x", "4ES:thunderbird-0:1.5.0.12-25.el4.src", "4ES:thunderbird-0:1.5.0.12-25.el4.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4WS:thunderbird-0:1.5.0.12-25.el4.i386", "4WS:thunderbird-0:1.5.0.12-25.el4.ia64", "4WS:thunderbird-0:1.5.0.12-25.el4.ppc", "4WS:thunderbird-0:1.5.0.12-25.el4.s390", "4WS:thunderbird-0:1.5.0.12-25.el4.s390x", "4WS:thunderbird-0:1.5.0.12-25.el4.src", "4WS:thunderbird-0:1.5.0.12-25.el4.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0154" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS:thunderbird-0:1.5.0.12-25.el4.i386", "4AS:thunderbird-0:1.5.0.12-25.el4.ia64", "4AS:thunderbird-0:1.5.0.12-25.el4.ppc", "4AS:thunderbird-0:1.5.0.12-25.el4.s390", "4AS:thunderbird-0:1.5.0.12-25.el4.s390x", "4AS:thunderbird-0:1.5.0.12-25.el4.src", "4AS:thunderbird-0:1.5.0.12-25.el4.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4Desktop:thunderbird-0:1.5.0.12-25.el4.i386", "4Desktop:thunderbird-0:1.5.0.12-25.el4.ia64", "4Desktop:thunderbird-0:1.5.0.12-25.el4.ppc", "4Desktop:thunderbird-0:1.5.0.12-25.el4.s390", "4Desktop:thunderbird-0:1.5.0.12-25.el4.s390x", "4Desktop:thunderbird-0:1.5.0.12-25.el4.src", "4Desktop:thunderbird-0:1.5.0.12-25.el4.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4ES:thunderbird-0:1.5.0.12-25.el4.i386", "4ES:thunderbird-0:1.5.0.12-25.el4.ia64", "4ES:thunderbird-0:1.5.0.12-25.el4.ppc", "4ES:thunderbird-0:1.5.0.12-25.el4.s390", "4ES:thunderbird-0:1.5.0.12-25.el4.s390x", "4ES:thunderbird-0:1.5.0.12-25.el4.src", "4ES:thunderbird-0:1.5.0.12-25.el4.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4WS:thunderbird-0:1.5.0.12-25.el4.i386", "4WS:thunderbird-0:1.5.0.12-25.el4.ia64", "4WS:thunderbird-0:1.5.0.12-25.el4.ppc", "4WS:thunderbird-0:1.5.0.12-25.el4.s390", "4WS:thunderbird-0:1.5.0.12-25.el4.s390x", "4WS:thunderbird-0:1.5.0.12-25.el4.src", "4WS:thunderbird-0:1.5.0.12-25.el4.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "Firefox integer underflow in FTP directory list parser" }, { "cve": "CVE-2009-3979", "discovery_date": "2009-12-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "546694" } ], "notes": [ { "category": "description", "text": "Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.0.16 and 3.5.x before 3.5.6, SeaMonkey before 2.0.1, and Thunderbird allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.", "title": "Vulnerability description" }, { "category": "summary", "text": "Mozilla crash with evidence of memory corruption", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS:thunderbird-0:1.5.0.12-25.el4.i386", "4AS:thunderbird-0:1.5.0.12-25.el4.ia64", "4AS:thunderbird-0:1.5.0.12-25.el4.ppc", "4AS:thunderbird-0:1.5.0.12-25.el4.s390", "4AS:thunderbird-0:1.5.0.12-25.el4.s390x", "4AS:thunderbird-0:1.5.0.12-25.el4.src", "4AS:thunderbird-0:1.5.0.12-25.el4.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4Desktop:thunderbird-0:1.5.0.12-25.el4.i386", "4Desktop:thunderbird-0:1.5.0.12-25.el4.ia64", "4Desktop:thunderbird-0:1.5.0.12-25.el4.ppc", "4Desktop:thunderbird-0:1.5.0.12-25.el4.s390", "4Desktop:thunderbird-0:1.5.0.12-25.el4.s390x", "4Desktop:thunderbird-0:1.5.0.12-25.el4.src", "4Desktop:thunderbird-0:1.5.0.12-25.el4.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4ES:thunderbird-0:1.5.0.12-25.el4.i386", "4ES:thunderbird-0:1.5.0.12-25.el4.ia64", "4ES:thunderbird-0:1.5.0.12-25.el4.ppc", "4ES:thunderbird-0:1.5.0.12-25.el4.s390", "4ES:thunderbird-0:1.5.0.12-25.el4.s390x", "4ES:thunderbird-0:1.5.0.12-25.el4.src", "4ES:thunderbird-0:1.5.0.12-25.el4.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4WS:thunderbird-0:1.5.0.12-25.el4.i386", "4WS:thunderbird-0:1.5.0.12-25.el4.ia64", "4WS:thunderbird-0:1.5.0.12-25.el4.ppc", "4WS:thunderbird-0:1.5.0.12-25.el4.s390", "4WS:thunderbird-0:1.5.0.12-25.el4.s390x", "4WS:thunderbird-0:1.5.0.12-25.el4.src", "4WS:thunderbird-0:1.5.0.12-25.el4.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-3979" }, { "category": "external", "summary": "RHBZ#546694", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=546694" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3979", "url": "https://www.cve.org/CVERecord?id=CVE-2009-3979" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3979", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3979" } ], "release_date": "2009-12-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-03-17T13:04:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS:thunderbird-0:1.5.0.12-25.el4.i386", "4AS:thunderbird-0:1.5.0.12-25.el4.ia64", "4AS:thunderbird-0:1.5.0.12-25.el4.ppc", "4AS:thunderbird-0:1.5.0.12-25.el4.s390", "4AS:thunderbird-0:1.5.0.12-25.el4.s390x", "4AS:thunderbird-0:1.5.0.12-25.el4.src", "4AS:thunderbird-0:1.5.0.12-25.el4.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4Desktop:thunderbird-0:1.5.0.12-25.el4.i386", "4Desktop:thunderbird-0:1.5.0.12-25.el4.ia64", "4Desktop:thunderbird-0:1.5.0.12-25.el4.ppc", "4Desktop:thunderbird-0:1.5.0.12-25.el4.s390", "4Desktop:thunderbird-0:1.5.0.12-25.el4.s390x", "4Desktop:thunderbird-0:1.5.0.12-25.el4.src", "4Desktop:thunderbird-0:1.5.0.12-25.el4.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4ES:thunderbird-0:1.5.0.12-25.el4.i386", "4ES:thunderbird-0:1.5.0.12-25.el4.ia64", "4ES:thunderbird-0:1.5.0.12-25.el4.ppc", "4ES:thunderbird-0:1.5.0.12-25.el4.s390", "4ES:thunderbird-0:1.5.0.12-25.el4.s390x", "4ES:thunderbird-0:1.5.0.12-25.el4.src", "4ES:thunderbird-0:1.5.0.12-25.el4.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4WS:thunderbird-0:1.5.0.12-25.el4.i386", "4WS:thunderbird-0:1.5.0.12-25.el4.ia64", "4WS:thunderbird-0:1.5.0.12-25.el4.ppc", "4WS:thunderbird-0:1.5.0.12-25.el4.s390", "4WS:thunderbird-0:1.5.0.12-25.el4.s390x", "4WS:thunderbird-0:1.5.0.12-25.el4.src", "4WS:thunderbird-0:1.5.0.12-25.el4.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0154" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS:thunderbird-0:1.5.0.12-25.el4.i386", "4AS:thunderbird-0:1.5.0.12-25.el4.ia64", "4AS:thunderbird-0:1.5.0.12-25.el4.ppc", "4AS:thunderbird-0:1.5.0.12-25.el4.s390", "4AS:thunderbird-0:1.5.0.12-25.el4.s390x", "4AS:thunderbird-0:1.5.0.12-25.el4.src", "4AS:thunderbird-0:1.5.0.12-25.el4.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4Desktop:thunderbird-0:1.5.0.12-25.el4.i386", "4Desktop:thunderbird-0:1.5.0.12-25.el4.ia64", "4Desktop:thunderbird-0:1.5.0.12-25.el4.ppc", "4Desktop:thunderbird-0:1.5.0.12-25.el4.s390", "4Desktop:thunderbird-0:1.5.0.12-25.el4.s390x", "4Desktop:thunderbird-0:1.5.0.12-25.el4.src", "4Desktop:thunderbird-0:1.5.0.12-25.el4.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4ES:thunderbird-0:1.5.0.12-25.el4.i386", "4ES:thunderbird-0:1.5.0.12-25.el4.ia64", "4ES:thunderbird-0:1.5.0.12-25.el4.ppc", "4ES:thunderbird-0:1.5.0.12-25.el4.s390", "4ES:thunderbird-0:1.5.0.12-25.el4.s390x", "4ES:thunderbird-0:1.5.0.12-25.el4.src", "4ES:thunderbird-0:1.5.0.12-25.el4.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4WS:thunderbird-0:1.5.0.12-25.el4.i386", "4WS:thunderbird-0:1.5.0.12-25.el4.ia64", "4WS:thunderbird-0:1.5.0.12-25.el4.ppc", "4WS:thunderbird-0:1.5.0.12-25.el4.s390", "4WS:thunderbird-0:1.5.0.12-25.el4.s390x", "4WS:thunderbird-0:1.5.0.12-25.el4.src", "4WS:thunderbird-0:1.5.0.12-25.el4.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "Mozilla crash with evidence of memory corruption" }, { "cve": "CVE-2010-0159", "discovery_date": "2010-02-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "566047" } ], "notes": [ { "category": "description", "text": "The browser engine in Mozilla Firefox 3.0.x before 3.0.18 and 3.5.x before 3.5.8, Thunderbird before 3.0.2, and SeaMonkey before 2.0.3 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to the nsBlockFrame::StealFrame function in layout/generic/nsBlockFrame.cpp, and unspecified other vectors.", "title": "Vulnerability description" }, { "category": "summary", "text": "Mozilla crashes with evidence of memory corruption (MFSA 2010-01)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS:thunderbird-0:1.5.0.12-25.el4.i386", "4AS:thunderbird-0:1.5.0.12-25.el4.ia64", "4AS:thunderbird-0:1.5.0.12-25.el4.ppc", "4AS:thunderbird-0:1.5.0.12-25.el4.s390", "4AS:thunderbird-0:1.5.0.12-25.el4.s390x", "4AS:thunderbird-0:1.5.0.12-25.el4.src", "4AS:thunderbird-0:1.5.0.12-25.el4.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4Desktop:thunderbird-0:1.5.0.12-25.el4.i386", "4Desktop:thunderbird-0:1.5.0.12-25.el4.ia64", "4Desktop:thunderbird-0:1.5.0.12-25.el4.ppc", "4Desktop:thunderbird-0:1.5.0.12-25.el4.s390", "4Desktop:thunderbird-0:1.5.0.12-25.el4.s390x", "4Desktop:thunderbird-0:1.5.0.12-25.el4.src", "4Desktop:thunderbird-0:1.5.0.12-25.el4.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4ES:thunderbird-0:1.5.0.12-25.el4.i386", "4ES:thunderbird-0:1.5.0.12-25.el4.ia64", "4ES:thunderbird-0:1.5.0.12-25.el4.ppc", "4ES:thunderbird-0:1.5.0.12-25.el4.s390", "4ES:thunderbird-0:1.5.0.12-25.el4.s390x", "4ES:thunderbird-0:1.5.0.12-25.el4.src", "4ES:thunderbird-0:1.5.0.12-25.el4.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4WS:thunderbird-0:1.5.0.12-25.el4.i386", "4WS:thunderbird-0:1.5.0.12-25.el4.ia64", "4WS:thunderbird-0:1.5.0.12-25.el4.ppc", "4WS:thunderbird-0:1.5.0.12-25.el4.s390", "4WS:thunderbird-0:1.5.0.12-25.el4.s390x", "4WS:thunderbird-0:1.5.0.12-25.el4.src", "4WS:thunderbird-0:1.5.0.12-25.el4.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-0159" }, { "category": "external", "summary": "RHBZ#566047", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=566047" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-0159", "url": "https://www.cve.org/CVERecord?id=CVE-2010-0159" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-0159", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-0159" } ], "release_date": "2010-02-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-03-17T13:04:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS:thunderbird-0:1.5.0.12-25.el4.i386", "4AS:thunderbird-0:1.5.0.12-25.el4.ia64", "4AS:thunderbird-0:1.5.0.12-25.el4.ppc", "4AS:thunderbird-0:1.5.0.12-25.el4.s390", "4AS:thunderbird-0:1.5.0.12-25.el4.s390x", "4AS:thunderbird-0:1.5.0.12-25.el4.src", "4AS:thunderbird-0:1.5.0.12-25.el4.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4Desktop:thunderbird-0:1.5.0.12-25.el4.i386", "4Desktop:thunderbird-0:1.5.0.12-25.el4.ia64", "4Desktop:thunderbird-0:1.5.0.12-25.el4.ppc", "4Desktop:thunderbird-0:1.5.0.12-25.el4.s390", "4Desktop:thunderbird-0:1.5.0.12-25.el4.s390x", "4Desktop:thunderbird-0:1.5.0.12-25.el4.src", "4Desktop:thunderbird-0:1.5.0.12-25.el4.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4ES:thunderbird-0:1.5.0.12-25.el4.i386", "4ES:thunderbird-0:1.5.0.12-25.el4.ia64", "4ES:thunderbird-0:1.5.0.12-25.el4.ppc", "4ES:thunderbird-0:1.5.0.12-25.el4.s390", "4ES:thunderbird-0:1.5.0.12-25.el4.s390x", "4ES:thunderbird-0:1.5.0.12-25.el4.src", "4ES:thunderbird-0:1.5.0.12-25.el4.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4WS:thunderbird-0:1.5.0.12-25.el4.i386", "4WS:thunderbird-0:1.5.0.12-25.el4.ia64", "4WS:thunderbird-0:1.5.0.12-25.el4.ppc", "4WS:thunderbird-0:1.5.0.12-25.el4.s390", "4WS:thunderbird-0:1.5.0.12-25.el4.s390x", "4WS:thunderbird-0:1.5.0.12-25.el4.src", "4WS:thunderbird-0:1.5.0.12-25.el4.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0154" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS:thunderbird-0:1.5.0.12-25.el4.i386", "4AS:thunderbird-0:1.5.0.12-25.el4.ia64", "4AS:thunderbird-0:1.5.0.12-25.el4.ppc", "4AS:thunderbird-0:1.5.0.12-25.el4.s390", "4AS:thunderbird-0:1.5.0.12-25.el4.s390x", "4AS:thunderbird-0:1.5.0.12-25.el4.src", "4AS:thunderbird-0:1.5.0.12-25.el4.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4Desktop:thunderbird-0:1.5.0.12-25.el4.i386", "4Desktop:thunderbird-0:1.5.0.12-25.el4.ia64", "4Desktop:thunderbird-0:1.5.0.12-25.el4.ppc", "4Desktop:thunderbird-0:1.5.0.12-25.el4.s390", "4Desktop:thunderbird-0:1.5.0.12-25.el4.s390x", "4Desktop:thunderbird-0:1.5.0.12-25.el4.src", "4Desktop:thunderbird-0:1.5.0.12-25.el4.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4ES:thunderbird-0:1.5.0.12-25.el4.i386", "4ES:thunderbird-0:1.5.0.12-25.el4.ia64", "4ES:thunderbird-0:1.5.0.12-25.el4.ppc", "4ES:thunderbird-0:1.5.0.12-25.el4.s390", "4ES:thunderbird-0:1.5.0.12-25.el4.s390x", "4ES:thunderbird-0:1.5.0.12-25.el4.src", "4ES:thunderbird-0:1.5.0.12-25.el4.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4WS:thunderbird-0:1.5.0.12-25.el4.i386", "4WS:thunderbird-0:1.5.0.12-25.el4.ia64", "4WS:thunderbird-0:1.5.0.12-25.el4.ppc", "4WS:thunderbird-0:1.5.0.12-25.el4.s390", "4WS:thunderbird-0:1.5.0.12-25.el4.s390x", "4WS:thunderbird-0:1.5.0.12-25.el4.src", "4WS:thunderbird-0:1.5.0.12-25.el4.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "Mozilla crashes with evidence of memory corruption (MFSA 2010-01)" }, { "cve": "CVE-2010-0163", "discovery_date": "2010-03-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "576391" } ], "notes": [ { "category": "description", "text": "Mozilla Thunderbird before 2.0.0.24 and SeaMonkey before 1.1.19 process e-mail attachments with a parser that performs casts and line termination incorrectly, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted message, related to message indexing.", "title": "Vulnerability description" }, { "category": "summary", "text": "seamonkey/thunderbird: crash when indexing certain messages with attachments", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS:thunderbird-0:1.5.0.12-25.el4.i386", "4AS:thunderbird-0:1.5.0.12-25.el4.ia64", "4AS:thunderbird-0:1.5.0.12-25.el4.ppc", "4AS:thunderbird-0:1.5.0.12-25.el4.s390", "4AS:thunderbird-0:1.5.0.12-25.el4.s390x", "4AS:thunderbird-0:1.5.0.12-25.el4.src", "4AS:thunderbird-0:1.5.0.12-25.el4.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4Desktop:thunderbird-0:1.5.0.12-25.el4.i386", "4Desktop:thunderbird-0:1.5.0.12-25.el4.ia64", "4Desktop:thunderbird-0:1.5.0.12-25.el4.ppc", "4Desktop:thunderbird-0:1.5.0.12-25.el4.s390", "4Desktop:thunderbird-0:1.5.0.12-25.el4.s390x", "4Desktop:thunderbird-0:1.5.0.12-25.el4.src", "4Desktop:thunderbird-0:1.5.0.12-25.el4.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4ES:thunderbird-0:1.5.0.12-25.el4.i386", "4ES:thunderbird-0:1.5.0.12-25.el4.ia64", "4ES:thunderbird-0:1.5.0.12-25.el4.ppc", "4ES:thunderbird-0:1.5.0.12-25.el4.s390", "4ES:thunderbird-0:1.5.0.12-25.el4.s390x", "4ES:thunderbird-0:1.5.0.12-25.el4.src", "4ES:thunderbird-0:1.5.0.12-25.el4.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4WS:thunderbird-0:1.5.0.12-25.el4.i386", "4WS:thunderbird-0:1.5.0.12-25.el4.ia64", "4WS:thunderbird-0:1.5.0.12-25.el4.ppc", "4WS:thunderbird-0:1.5.0.12-25.el4.s390", "4WS:thunderbird-0:1.5.0.12-25.el4.s390x", "4WS:thunderbird-0:1.5.0.12-25.el4.src", "4WS:thunderbird-0:1.5.0.12-25.el4.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-0163" }, { "category": "external", "summary": "RHBZ#576391", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=576391" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-0163", "url": "https://www.cve.org/CVERecord?id=CVE-2010-0163" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-0163", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-0163" } ], "release_date": "2010-03-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-03-17T13:04:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS:thunderbird-0:1.5.0.12-25.el4.i386", "4AS:thunderbird-0:1.5.0.12-25.el4.ia64", "4AS:thunderbird-0:1.5.0.12-25.el4.ppc", "4AS:thunderbird-0:1.5.0.12-25.el4.s390", "4AS:thunderbird-0:1.5.0.12-25.el4.s390x", "4AS:thunderbird-0:1.5.0.12-25.el4.src", "4AS:thunderbird-0:1.5.0.12-25.el4.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4Desktop:thunderbird-0:1.5.0.12-25.el4.i386", "4Desktop:thunderbird-0:1.5.0.12-25.el4.ia64", "4Desktop:thunderbird-0:1.5.0.12-25.el4.ppc", "4Desktop:thunderbird-0:1.5.0.12-25.el4.s390", "4Desktop:thunderbird-0:1.5.0.12-25.el4.s390x", "4Desktop:thunderbird-0:1.5.0.12-25.el4.src", "4Desktop:thunderbird-0:1.5.0.12-25.el4.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4ES:thunderbird-0:1.5.0.12-25.el4.i386", "4ES:thunderbird-0:1.5.0.12-25.el4.ia64", "4ES:thunderbird-0:1.5.0.12-25.el4.ppc", "4ES:thunderbird-0:1.5.0.12-25.el4.s390", "4ES:thunderbird-0:1.5.0.12-25.el4.s390x", "4ES:thunderbird-0:1.5.0.12-25.el4.src", "4ES:thunderbird-0:1.5.0.12-25.el4.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4WS:thunderbird-0:1.5.0.12-25.el4.i386", "4WS:thunderbird-0:1.5.0.12-25.el4.ia64", "4WS:thunderbird-0:1.5.0.12-25.el4.ppc", "4WS:thunderbird-0:1.5.0.12-25.el4.s390", "4WS:thunderbird-0:1.5.0.12-25.el4.s390x", "4WS:thunderbird-0:1.5.0.12-25.el4.src", "4WS:thunderbird-0:1.5.0.12-25.el4.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0154" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS:thunderbird-0:1.5.0.12-25.el4.i386", "4AS:thunderbird-0:1.5.0.12-25.el4.ia64", "4AS:thunderbird-0:1.5.0.12-25.el4.ppc", "4AS:thunderbird-0:1.5.0.12-25.el4.s390", "4AS:thunderbird-0:1.5.0.12-25.el4.s390x", "4AS:thunderbird-0:1.5.0.12-25.el4.src", "4AS:thunderbird-0:1.5.0.12-25.el4.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4Desktop:thunderbird-0:1.5.0.12-25.el4.i386", "4Desktop:thunderbird-0:1.5.0.12-25.el4.ia64", "4Desktop:thunderbird-0:1.5.0.12-25.el4.ppc", "4Desktop:thunderbird-0:1.5.0.12-25.el4.s390", "4Desktop:thunderbird-0:1.5.0.12-25.el4.s390x", "4Desktop:thunderbird-0:1.5.0.12-25.el4.src", "4Desktop:thunderbird-0:1.5.0.12-25.el4.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4ES:thunderbird-0:1.5.0.12-25.el4.i386", "4ES:thunderbird-0:1.5.0.12-25.el4.ia64", "4ES:thunderbird-0:1.5.0.12-25.el4.ppc", "4ES:thunderbird-0:1.5.0.12-25.el4.s390", "4ES:thunderbird-0:1.5.0.12-25.el4.s390x", "4ES:thunderbird-0:1.5.0.12-25.el4.src", "4ES:thunderbird-0:1.5.0.12-25.el4.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4WS:thunderbird-0:1.5.0.12-25.el4.i386", "4WS:thunderbird-0:1.5.0.12-25.el4.ia64", "4WS:thunderbird-0:1.5.0.12-25.el4.ppc", "4WS:thunderbird-0:1.5.0.12-25.el4.s390", "4WS:thunderbird-0:1.5.0.12-25.el4.s390x", "4WS:thunderbird-0:1.5.0.12-25.el4.src", "4WS:thunderbird-0:1.5.0.12-25.el4.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "seamonkey/thunderbird: crash when indexing certain messages with attachments" }, { "cve": "CVE-2010-0169", "discovery_date": "2010-03-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "576694" } ], "notes": [ { "category": "description", "text": "The CSSLoaderImpl::DoSheetComplete function in layout/style/nsCSSLoader.cpp in Mozilla Firefox 3.0.x before 3.0.18, 3.5.x before 3.5.8, and 3.6.x before 3.6.2; Thunderbird before 3.0.2; and SeaMonkey before 2.0.3 changes the case of certain strings in a stylesheet before adding this stylesheet to the XUL cache, which might allow remote attackers to modify the browser\u0027s font and other CSS attributes, and potentially disrupt rendering of a web page, by forcing the browser to perform this erroneous stylesheet caching.", "title": "Vulnerability description" }, { "category": "summary", "text": "firefox/thunderbird/seamonkey: browser chrome defacement via cached XUL stylesheets (MFSA 2010-14)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS:thunderbird-0:1.5.0.12-25.el4.i386", "4AS:thunderbird-0:1.5.0.12-25.el4.ia64", "4AS:thunderbird-0:1.5.0.12-25.el4.ppc", "4AS:thunderbird-0:1.5.0.12-25.el4.s390", "4AS:thunderbird-0:1.5.0.12-25.el4.s390x", "4AS:thunderbird-0:1.5.0.12-25.el4.src", "4AS:thunderbird-0:1.5.0.12-25.el4.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4Desktop:thunderbird-0:1.5.0.12-25.el4.i386", "4Desktop:thunderbird-0:1.5.0.12-25.el4.ia64", "4Desktop:thunderbird-0:1.5.0.12-25.el4.ppc", "4Desktop:thunderbird-0:1.5.0.12-25.el4.s390", "4Desktop:thunderbird-0:1.5.0.12-25.el4.s390x", "4Desktop:thunderbird-0:1.5.0.12-25.el4.src", "4Desktop:thunderbird-0:1.5.0.12-25.el4.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4ES:thunderbird-0:1.5.0.12-25.el4.i386", "4ES:thunderbird-0:1.5.0.12-25.el4.ia64", "4ES:thunderbird-0:1.5.0.12-25.el4.ppc", "4ES:thunderbird-0:1.5.0.12-25.el4.s390", "4ES:thunderbird-0:1.5.0.12-25.el4.s390x", "4ES:thunderbird-0:1.5.0.12-25.el4.src", "4ES:thunderbird-0:1.5.0.12-25.el4.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4WS:thunderbird-0:1.5.0.12-25.el4.i386", "4WS:thunderbird-0:1.5.0.12-25.el4.ia64", "4WS:thunderbird-0:1.5.0.12-25.el4.ppc", "4WS:thunderbird-0:1.5.0.12-25.el4.s390", "4WS:thunderbird-0:1.5.0.12-25.el4.s390x", "4WS:thunderbird-0:1.5.0.12-25.el4.src", "4WS:thunderbird-0:1.5.0.12-25.el4.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-0169" }, { "category": "external", "summary": "RHBZ#576694", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=576694" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-0169", "url": "https://www.cve.org/CVERecord?id=CVE-2010-0169" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-0169", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-0169" } ], "release_date": "2010-03-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-03-17T13:04:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS:thunderbird-0:1.5.0.12-25.el4.i386", "4AS:thunderbird-0:1.5.0.12-25.el4.ia64", "4AS:thunderbird-0:1.5.0.12-25.el4.ppc", "4AS:thunderbird-0:1.5.0.12-25.el4.s390", "4AS:thunderbird-0:1.5.0.12-25.el4.s390x", "4AS:thunderbird-0:1.5.0.12-25.el4.src", "4AS:thunderbird-0:1.5.0.12-25.el4.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4Desktop:thunderbird-0:1.5.0.12-25.el4.i386", "4Desktop:thunderbird-0:1.5.0.12-25.el4.ia64", "4Desktop:thunderbird-0:1.5.0.12-25.el4.ppc", "4Desktop:thunderbird-0:1.5.0.12-25.el4.s390", "4Desktop:thunderbird-0:1.5.0.12-25.el4.s390x", "4Desktop:thunderbird-0:1.5.0.12-25.el4.src", "4Desktop:thunderbird-0:1.5.0.12-25.el4.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4ES:thunderbird-0:1.5.0.12-25.el4.i386", "4ES:thunderbird-0:1.5.0.12-25.el4.ia64", "4ES:thunderbird-0:1.5.0.12-25.el4.ppc", "4ES:thunderbird-0:1.5.0.12-25.el4.s390", "4ES:thunderbird-0:1.5.0.12-25.el4.s390x", "4ES:thunderbird-0:1.5.0.12-25.el4.src", "4ES:thunderbird-0:1.5.0.12-25.el4.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4WS:thunderbird-0:1.5.0.12-25.el4.i386", "4WS:thunderbird-0:1.5.0.12-25.el4.ia64", "4WS:thunderbird-0:1.5.0.12-25.el4.ppc", "4WS:thunderbird-0:1.5.0.12-25.el4.s390", "4WS:thunderbird-0:1.5.0.12-25.el4.s390x", "4WS:thunderbird-0:1.5.0.12-25.el4.src", "4WS:thunderbird-0:1.5.0.12-25.el4.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0154" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "4AS:thunderbird-0:1.5.0.12-25.el4.i386", "4AS:thunderbird-0:1.5.0.12-25.el4.ia64", "4AS:thunderbird-0:1.5.0.12-25.el4.ppc", "4AS:thunderbird-0:1.5.0.12-25.el4.s390", "4AS:thunderbird-0:1.5.0.12-25.el4.s390x", "4AS:thunderbird-0:1.5.0.12-25.el4.src", "4AS:thunderbird-0:1.5.0.12-25.el4.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4Desktop:thunderbird-0:1.5.0.12-25.el4.i386", "4Desktop:thunderbird-0:1.5.0.12-25.el4.ia64", "4Desktop:thunderbird-0:1.5.0.12-25.el4.ppc", "4Desktop:thunderbird-0:1.5.0.12-25.el4.s390", "4Desktop:thunderbird-0:1.5.0.12-25.el4.s390x", "4Desktop:thunderbird-0:1.5.0.12-25.el4.src", "4Desktop:thunderbird-0:1.5.0.12-25.el4.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4ES:thunderbird-0:1.5.0.12-25.el4.i386", "4ES:thunderbird-0:1.5.0.12-25.el4.ia64", "4ES:thunderbird-0:1.5.0.12-25.el4.ppc", "4ES:thunderbird-0:1.5.0.12-25.el4.s390", "4ES:thunderbird-0:1.5.0.12-25.el4.s390x", "4ES:thunderbird-0:1.5.0.12-25.el4.src", "4ES:thunderbird-0:1.5.0.12-25.el4.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4WS:thunderbird-0:1.5.0.12-25.el4.i386", "4WS:thunderbird-0:1.5.0.12-25.el4.ia64", "4WS:thunderbird-0:1.5.0.12-25.el4.ppc", "4WS:thunderbird-0:1.5.0.12-25.el4.s390", "4WS:thunderbird-0:1.5.0.12-25.el4.s390x", "4WS:thunderbird-0:1.5.0.12-25.el4.src", "4WS:thunderbird-0:1.5.0.12-25.el4.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "firefox/thunderbird/seamonkey: browser chrome defacement via cached XUL stylesheets (MFSA 2010-14)" }, { "cve": "CVE-2010-0171", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2010-03-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "576696" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox 3.0.x before 3.0.18, 3.5.x before 3.5.8, and 3.6.x before 3.6.2; Thunderbird before 3.0.2; and SeaMonkey before 2.0.3 allow remote attackers to perform cross-origin keystroke capture, and possibly conduct cross-site scripting (XSS) attacks, by using the addEventListener and setTimeout functions in conjunction with a wrapped object. NOTE: this vulnerability exists because of an incomplete fix for CVE-2007-3736.", "title": "Vulnerability description" }, { "category": "summary", "text": "firefox/thunderbird/seamonkey: XSS using addEventListener and setTimeout on a wrapped object (MFSA 2010-12)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS:thunderbird-0:1.5.0.12-25.el4.i386", "4AS:thunderbird-0:1.5.0.12-25.el4.ia64", "4AS:thunderbird-0:1.5.0.12-25.el4.ppc", "4AS:thunderbird-0:1.5.0.12-25.el4.s390", "4AS:thunderbird-0:1.5.0.12-25.el4.s390x", "4AS:thunderbird-0:1.5.0.12-25.el4.src", "4AS:thunderbird-0:1.5.0.12-25.el4.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4Desktop:thunderbird-0:1.5.0.12-25.el4.i386", "4Desktop:thunderbird-0:1.5.0.12-25.el4.ia64", "4Desktop:thunderbird-0:1.5.0.12-25.el4.ppc", "4Desktop:thunderbird-0:1.5.0.12-25.el4.s390", "4Desktop:thunderbird-0:1.5.0.12-25.el4.s390x", "4Desktop:thunderbird-0:1.5.0.12-25.el4.src", "4Desktop:thunderbird-0:1.5.0.12-25.el4.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4ES:thunderbird-0:1.5.0.12-25.el4.i386", "4ES:thunderbird-0:1.5.0.12-25.el4.ia64", "4ES:thunderbird-0:1.5.0.12-25.el4.ppc", "4ES:thunderbird-0:1.5.0.12-25.el4.s390", "4ES:thunderbird-0:1.5.0.12-25.el4.s390x", "4ES:thunderbird-0:1.5.0.12-25.el4.src", "4ES:thunderbird-0:1.5.0.12-25.el4.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4WS:thunderbird-0:1.5.0.12-25.el4.i386", "4WS:thunderbird-0:1.5.0.12-25.el4.ia64", "4WS:thunderbird-0:1.5.0.12-25.el4.ppc", "4WS:thunderbird-0:1.5.0.12-25.el4.s390", "4WS:thunderbird-0:1.5.0.12-25.el4.s390x", "4WS:thunderbird-0:1.5.0.12-25.el4.src", "4WS:thunderbird-0:1.5.0.12-25.el4.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-0171" }, { "category": "external", "summary": "RHBZ#576696", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=576696" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-0171", "url": "https://www.cve.org/CVERecord?id=CVE-2010-0171" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-0171", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-0171" } ], "release_date": "2010-03-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-03-17T13:04:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS:thunderbird-0:1.5.0.12-25.el4.i386", "4AS:thunderbird-0:1.5.0.12-25.el4.ia64", "4AS:thunderbird-0:1.5.0.12-25.el4.ppc", "4AS:thunderbird-0:1.5.0.12-25.el4.s390", "4AS:thunderbird-0:1.5.0.12-25.el4.s390x", "4AS:thunderbird-0:1.5.0.12-25.el4.src", "4AS:thunderbird-0:1.5.0.12-25.el4.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4Desktop:thunderbird-0:1.5.0.12-25.el4.i386", "4Desktop:thunderbird-0:1.5.0.12-25.el4.ia64", "4Desktop:thunderbird-0:1.5.0.12-25.el4.ppc", "4Desktop:thunderbird-0:1.5.0.12-25.el4.s390", "4Desktop:thunderbird-0:1.5.0.12-25.el4.s390x", "4Desktop:thunderbird-0:1.5.0.12-25.el4.src", "4Desktop:thunderbird-0:1.5.0.12-25.el4.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4ES:thunderbird-0:1.5.0.12-25.el4.i386", "4ES:thunderbird-0:1.5.0.12-25.el4.ia64", "4ES:thunderbird-0:1.5.0.12-25.el4.ppc", "4ES:thunderbird-0:1.5.0.12-25.el4.s390", "4ES:thunderbird-0:1.5.0.12-25.el4.s390x", "4ES:thunderbird-0:1.5.0.12-25.el4.src", "4ES:thunderbird-0:1.5.0.12-25.el4.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4WS:thunderbird-0:1.5.0.12-25.el4.i386", "4WS:thunderbird-0:1.5.0.12-25.el4.ia64", "4WS:thunderbird-0:1.5.0.12-25.el4.ppc", "4WS:thunderbird-0:1.5.0.12-25.el4.s390", "4WS:thunderbird-0:1.5.0.12-25.el4.s390x", "4WS:thunderbird-0:1.5.0.12-25.el4.src", "4WS:thunderbird-0:1.5.0.12-25.el4.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0154" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "4AS:thunderbird-0:1.5.0.12-25.el4.i386", "4AS:thunderbird-0:1.5.0.12-25.el4.ia64", "4AS:thunderbird-0:1.5.0.12-25.el4.ppc", "4AS:thunderbird-0:1.5.0.12-25.el4.s390", "4AS:thunderbird-0:1.5.0.12-25.el4.s390x", "4AS:thunderbird-0:1.5.0.12-25.el4.src", "4AS:thunderbird-0:1.5.0.12-25.el4.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4Desktop:thunderbird-0:1.5.0.12-25.el4.i386", "4Desktop:thunderbird-0:1.5.0.12-25.el4.ia64", "4Desktop:thunderbird-0:1.5.0.12-25.el4.ppc", "4Desktop:thunderbird-0:1.5.0.12-25.el4.s390", "4Desktop:thunderbird-0:1.5.0.12-25.el4.s390x", "4Desktop:thunderbird-0:1.5.0.12-25.el4.src", "4Desktop:thunderbird-0:1.5.0.12-25.el4.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4ES:thunderbird-0:1.5.0.12-25.el4.i386", "4ES:thunderbird-0:1.5.0.12-25.el4.ia64", "4ES:thunderbird-0:1.5.0.12-25.el4.ppc", "4ES:thunderbird-0:1.5.0.12-25.el4.s390", "4ES:thunderbird-0:1.5.0.12-25.el4.s390x", "4ES:thunderbird-0:1.5.0.12-25.el4.src", "4ES:thunderbird-0:1.5.0.12-25.el4.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64", "4WS:thunderbird-0:1.5.0.12-25.el4.i386", "4WS:thunderbird-0:1.5.0.12-25.el4.ia64", "4WS:thunderbird-0:1.5.0.12-25.el4.ppc", "4WS:thunderbird-0:1.5.0.12-25.el4.s390", "4WS:thunderbird-0:1.5.0.12-25.el4.s390x", "4WS:thunderbird-0:1.5.0.12-25.el4.src", "4WS:thunderbird-0:1.5.0.12-25.el4.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.i386", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.12-25.el4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "firefox/thunderbird/seamonkey: XSS using addEventListener and setTimeout on a wrapped object (MFSA 2010-12)" } ] }
ghsa-734v-fvv9-cgqm
Vulnerability from github
Published
2022-05-02 03:50
Modified
2022-05-02 03:50
Details
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.0.16 and 3.5.x before 3.5.6, SeaMonkey before 2.0.1, and Thunderbird allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
{ "affected": [], "aliases": [ "CVE-2009-3979" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2009-12-17T17:30:00Z", "severity": "HIGH" }, "details": "Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.0.16 and 3.5.x before 3.5.6, SeaMonkey before 2.0.1, and Thunderbird allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.", "id": "GHSA-734v-fvv9-cgqm", "modified": "2022-05-02T03:50:18Z", "published": "2022-05-02T03:50:18Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3979" }, { "type": "WEB", "url": "https://www.redhat.com/archives/fedora-package-announce/2009-December/msg01041.html" }, { "type": "WEB", "url": "https://www.redhat.com/archives/fedora-package-announce/2009-December/msg01034.html" }, { "type": "WEB", "url": "https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00995.html" }, { "type": "WEB", "url": "https://rhn.redhat.com/errata/RHSA-2009-1674.html" }, { "type": "WEB", "url": "https://rhn.redhat.com/errata/RHSA-2009-1673.html" }, { "type": "WEB", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8487" }, { "type": "WEB", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10956" }, { "type": "WEB", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54799" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=546694" }, { "type": "WEB", "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=522374" }, { "type": "WEB", "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=516237" }, { "type": "WEB", "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=515811" }, { "type": "WEB", "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=506267" }, { "type": "WEB", "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=494617" }, { "type": "WEB", "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=479931" }, { "type": "WEB", "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=457514" }, { "type": "WEB", "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=293347" }, { "type": "WEB", "url": "http://secunia.com/advisories/37699" }, { "type": "WEB", "url": "http://secunia.com/advisories/37703" }, { "type": "WEB", "url": "http://secunia.com/advisories/37704" }, { "type": "WEB", "url": "http://secunia.com/advisories/37785" }, { "type": "WEB", "url": "http://secunia.com/advisories/37813" }, { "type": "WEB", "url": "http://secunia.com/advisories/37856" }, { "type": "WEB", "url": "http://secunia.com/advisories/37881" }, { "type": "WEB", "url": "http://securitytracker.com/id?1023333" }, { "type": "WEB", "url": "http://securitytracker.com/id?1023334" }, { "type": "WEB", "url": "http://www.debian.org/security/2009/dsa-1956" }, { "type": "WEB", "url": "http://www.mozilla.org/security/announce/2009/mfsa2009-65.html" }, { "type": "WEB", "url": "http://www.novell.com/linux/security/advisories/2009_63_firefox.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2010-0153.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2010-0154.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/37349" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/37361" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/USN-873-1" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/USN-874-1" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2009/3547" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2010/0650" } ], "schema_version": "1.4.0", "severity": [] }
gsd-2009-3979
Vulnerability from gsd
Modified
2023-12-13 01:19
Details
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.0.16 and 3.5.x before 3.5.6, SeaMonkey before 2.0.1, and Thunderbird allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2009-3979", "description": "Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.0.16 and 3.5.x before 3.5.6, SeaMonkey before 2.0.1, and Thunderbird allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.", "id": "GSD-2009-3979", "references": [ "https://www.suse.com/security/cve/CVE-2009-3979.html", "https://www.debian.org/security/2009/dsa-1956", "https://access.redhat.com/errata/RHSA-2010:0154", "https://access.redhat.com/errata/RHSA-2010:0153", "https://access.redhat.com/errata/RHSA-2009:1674", "https://access.redhat.com/errata/RHSA-2009:1673", "https://linux.oracle.com/cve/CVE-2009-3979.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2009-3979" ], "details": "Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.0.16 and 3.5.x before 3.5.6, SeaMonkey before 2.0.1, and Thunderbird allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.", "id": "GSD-2009-3979", "modified": "2023-12-13T01:19:49.348597Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2009-3979", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.0.16 and 3.5.x before 3.5.6, SeaMonkey before 2.0.1, and Thunderbird allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "37704", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/37704" }, { "name": "RHSA-2010:0153", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2010-0153.html" }, { "name": "https://bugzilla.mozilla.org/show_bug.cgi?id=293347", "refsource": "CONFIRM", "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=293347" }, { "name": "37699", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/37699" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=546694", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=546694" }, { "name": "https://bugzilla.mozilla.org/show_bug.cgi?id=479931", "refsource": "CONFIRM", "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=479931" }, { "name": "oval:org.mitre.oval:def:10956", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10956" }, { "name": "ADV-2009-3547", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/3547" }, { "name": "37703", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/37703" }, { "name": "ADV-2010-0650", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/0650" }, { "name": "37881", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/37881" }, { "name": "mozilla-seamonkey-browser-code-exec(54799)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54799" }, { "name": "FEDORA-2009-13362", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2009-December/msg01034.html" }, { "name": "37785", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/37785" }, { "name": "1023333", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1023333" }, { "name": "USN-874-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-874-1" }, { "name": "37813", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/37813" }, { "name": "FEDORA-2009-13333", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00995.html" }, { "name": "USN-873-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-873-1" }, { "name": "https://bugzilla.mozilla.org/show_bug.cgi?id=516237", "refsource": "CONFIRM", "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=516237" }, { "name": "RHSA-2010:0154", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2010-0154.html" }, { "name": "https://bugzilla.mozilla.org/show_bug.cgi?id=522374", "refsource": "CONFIRM", "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=522374" }, { "name": "37349", "refsource": "BID", "url": "http://www.securityfocus.com/bid/37349" }, { "name": "RHSA-2009:1674", "refsource": "REDHAT", "url": "https://rhn.redhat.com/errata/RHSA-2009-1674.html" }, { "name": "FEDORA-2009-13366", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2009-December/msg01041.html" }, { "name": "https://bugzilla.mozilla.org/show_bug.cgi?id=494617", "refsource": "CONFIRM", "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=494617" }, { "name": "DSA-1956", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2009/dsa-1956" }, { "name": "https://bugzilla.mozilla.org/show_bug.cgi?id=506267", "refsource": "CONFIRM", "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=506267" }, { "name": "37856", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/37856" }, { "name": "http://www.mozilla.org/security/announce/2009/mfsa2009-65.html", "refsource": "CONFIRM", "url": "http://www.mozilla.org/security/announce/2009/mfsa2009-65.html" }, { "name": "RHSA-2009:1673", "refsource": "REDHAT", "url": "https://rhn.redhat.com/errata/RHSA-2009-1673.html" }, { "name": "1023334", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1023334" }, { "name": "https://bugzilla.mozilla.org/show_bug.cgi?id=515811", "refsource": "CONFIRM", "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=515811" }, { "name": "https://bugzilla.mozilla.org/show_bug.cgi?id=457514", "refsource": "CONFIRM", "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=457514" }, { "name": "SUSE-SA:2009:063", "refsource": "SUSE", "url": "http://www.novell.com/linux/security/advisories/2009_63_firefox.html" }, { "name": "37361", "refsource": "BID", "url": "http://www.securityfocus.com/bid/37361" }, { "name": "oval:org.mitre.oval:def:8487", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8487" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:mozilla:firefox:3.5.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:firefox:3.5.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.0.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.0.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.0.99:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.0.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.1.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.1.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.1:beta:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.1.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.0:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.0:beta_2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:firefox:0.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:firefox:0.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:firefox:0.9.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:firefox:0.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.0:preview_release:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.5.0.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.4.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.5.0.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.5.0.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.5.0.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.0.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.0.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.0:alpha:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.1.14:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.1.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.1.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.1.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.5.0.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.0:beta_1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.0:alpha_3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:firefox:0.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:firefox:0.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:firefox:0.9.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:firefox:0.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.0.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.0.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.0.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.5.0.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.5.0.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.5.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.5.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.5.0.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.5:beta2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:firefox:2.0.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:firefox:2.0.0.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:firefox:2.0.0.18:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:firefox:2.0.0.19:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:firefox:2.0.0.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:firefox:2.0.0.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:firefox:2.0_.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:firefox:2.0:rc3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:firefox:3.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:firefox:3.0.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:firefox:3.0.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:firefox:3.0.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "3.0.15", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.5.0.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.5:beta1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:firefox:2.0.0.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:firefox:2.0.0.16:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:firefox:2.0.0.17:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:firefox:2.0.0.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:firefox:2.0.0.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:firefox:2.0_.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:firefox:2.0_.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:firefox:2.0_8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:firefox:3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:firefox:3.0.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:firefox:3.0.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:firefox:3.0:beta2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:firefox:3.0:alpha:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.0.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.0:beta:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.1.15:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.1.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.1.16:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.1.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.1.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.0:alpha_2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.0:alpha_1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.0a1:*:pre:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.0a1pre:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:*:rc2:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:firefox:0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:firefox:0.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:firefox:0.9.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:firefox:0.7.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.0.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.0.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.5.0.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.5.0.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.5.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.5.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:firefox:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:firefox:2.0.0.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:firefox:2.0.0.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:firefox:2.0.0.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:firefox:2.0.0.20:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:firefox:2.0.0.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:firefox:2.0:beta_1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:firefox:2.0_.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:firefox:2.0_.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:firefox:3.0.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:firefox:3.0.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:firefox:3.0.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:firefox:3.0.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:firefox:3.5.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:firefox:3.5.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:firefox:3.5.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.0.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.1.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.1.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.1.17:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.1:alpha:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.1.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.5.0.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.5.0.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:firefox:0.10.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:firefox:0.6.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:firefox:0.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:firefox:0.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:firefox:0.9:rc:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.0.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.0.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.5.0.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.5.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.5.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.5.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.5.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.5.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:firefox:2.0.0.14:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:firefox:2.0.0.15:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:firefox:2.0.0.21:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:firefox:2.0.0.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:firefox:2.0.0.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:firefox:2.0:beta1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:firefox:2.0_.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:firefox:2.0_.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:firefox:2.0:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:firefox:3.0.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:firefox:3.0.14:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:firefox:3.0.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:firefox:3.0.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:firefox:3.0:beta5:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2009-3979" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.0.16 and 3.5.x before 3.5.6, SeaMonkey before 2.0.1, and Thunderbird allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ] } ] }, "references": { "reference_data": [ { "name": "RHSA-2009:1674", "refsource": "REDHAT", "tags": [], "url": "https://rhn.redhat.com/errata/RHSA-2009-1674.html" }, { "name": "RHSA-2009:1673", "refsource": "REDHAT", "tags": [], "url": "https://rhn.redhat.com/errata/RHSA-2009-1673.html" }, { "name": "37785", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/37785" }, { "name": "https://bugzilla.mozilla.org/show_bug.cgi?id=515811", "refsource": "CONFIRM", "tags": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=515811" }, { "name": "https://bugzilla.mozilla.org/show_bug.cgi?id=457514", "refsource": "CONFIRM", "tags": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=457514" }, { "name": "37699", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/37699" }, { "name": "https://bugzilla.mozilla.org/show_bug.cgi?id=293347", "refsource": "CONFIRM", "tags": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=293347" }, { "name": "1023334", "refsource": "SECTRACK", "tags": [], "url": "http://securitytracker.com/id?1023334" }, { "name": "37361", "refsource": "BID", "tags": [], "url": "http://www.securityfocus.com/bid/37361" }, { "name": "https://bugzilla.mozilla.org/show_bug.cgi?id=522374", "refsource": "CONFIRM", "tags": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=522374" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=546694", "refsource": "CONFIRM", "tags": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=546694" }, { "name": "https://bugzilla.mozilla.org/show_bug.cgi?id=516237", "refsource": "CONFIRM", "tags": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=516237" }, { "name": "https://bugzilla.mozilla.org/show_bug.cgi?id=494617", "refsource": "CONFIRM", "tags": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=494617" }, { "name": "37704", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/37704" }, { "name": "37703", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/37703" }, { "name": "http://www.mozilla.org/security/announce/2009/mfsa2009-65.html", "refsource": "CONFIRM", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.mozilla.org/security/announce/2009/mfsa2009-65.html" }, { "name": "https://bugzilla.mozilla.org/show_bug.cgi?id=506267", "refsource": "CONFIRM", "tags": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=506267" }, { "name": "ADV-2009-3547", "refsource": "VUPEN", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2009/3547" }, { "name": "1023333", "refsource": "SECTRACK", "tags": [], "url": "http://securitytracker.com/id?1023333" }, { "name": "37349", "refsource": "BID", "tags": [], "url": "http://www.securityfocus.com/bid/37349" }, { "name": "https://bugzilla.mozilla.org/show_bug.cgi?id=479931", "refsource": "CONFIRM", "tags": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=479931" }, { "name": "DSA-1956", "refsource": "DEBIAN", "tags": [], "url": "http://www.debian.org/security/2009/dsa-1956" }, { "name": "FEDORA-2009-13333", "refsource": "FEDORA", "tags": [], "url": "https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00995.html" }, { "name": "FEDORA-2009-13366", "refsource": "FEDORA", "tags": [], "url": "https://www.redhat.com/archives/fedora-package-announce/2009-December/msg01041.html" }, { "name": "USN-874-1", "refsource": "UBUNTU", "tags": [], "url": "http://www.ubuntu.com/usn/USN-874-1" }, { "name": "USN-873-1", "refsource": "UBUNTU", "tags": [], "url": "http://www.ubuntu.com/usn/USN-873-1" }, { "name": "FEDORA-2009-13362", "refsource": "FEDORA", "tags": [], "url": "https://www.redhat.com/archives/fedora-package-announce/2009-December/msg01034.html" }, { "name": "37881", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/37881" }, { "name": "37856", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/37856" }, { "name": "37813", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/37813" }, { "name": "SUSE-SA:2009:063", "refsource": "SUSE", "tags": [], "url": "http://www.novell.com/linux/security/advisories/2009_63_firefox.html" }, { "name": "RHSA-2010:0154", "refsource": "REDHAT", "tags": [], "url": "http://www.redhat.com/support/errata/RHSA-2010-0154.html" }, { "name": "ADV-2010-0650", "refsource": "VUPEN", "tags": [], "url": "http://www.vupen.com/english/advisories/2010/0650" }, { "name": "RHSA-2010:0153", "refsource": "REDHAT", "tags": [], "url": "http://www.redhat.com/support/errata/RHSA-2010-0153.html" }, { "name": "mozilla-seamonkey-browser-code-exec(54799)", "refsource": "XF", "tags": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54799" }, { "name": "oval:org.mitre.oval:def:8487", "refsource": "OVAL", "tags": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8487" }, { "name": "oval:org.mitre.oval:def:10956", "refsource": "OVAL", "tags": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10956" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": true } }, "lastModifiedDate": "2017-09-19T01:29Z", "publishedDate": "2009-12-17T17:30Z" } } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.