Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2006-3677 (GCVE-0-2006-3677)
Vulnerability from cvelistv5
- n/a
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T18:39:53.571Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20060726 ZDI-06-025: Mozilla Firefox Javascript navigator Object Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/441332/100/0/threaded" }, { "name": "21243", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/21243" }, { "name": "RHSA-2006:0608", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2006-0608.html" }, { "name": "GLSA-200608-02", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200608-02.xml" }, { "name": "MDKSA-2006:145", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:145" }, { "name": "ADV-2006-3748", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/3748" }, { "name": "iphone-mobilesafari-dos(39998)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39998" }, { "name": "19181", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/19181" }, { "name": "mozilla-javascript-navigator-code-excecution(27981)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27981" }, { "name": "TA06-208A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA06-208A.html" }, { "name": "ADV-2006-2998", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/2998" }, { "name": "20060727 rPSA-2006-0137-1 firefox", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/441333/100/0/threaded" }, { "name": "21529", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/21529" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.zerodayinitiative.com/advisories/ZDI-06-025.html" }, { "name": "oval:org.mitre.oval:def:10745", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10745" }, { "name": "21216", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/21216" }, { "name": "GLSA-200608-03", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200608-03.xml" }, { "name": "RHSA-2006:0594", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2006-0594.html" }, { "name": "21336", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/21336" }, { "name": "RHSA-2006:0610", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2006-0610.html" }, { "name": "VU#670060", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/670060" }, { "name": "RHSA-2006:0609", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2006-0609.html" }, { "name": "22210", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/22210" }, { "name": "1016586", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1016586" }, { "name": "19873", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/19873" }, { "name": "21262", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/21262" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.mozilla.org/security/announce/2006/mfsa2006-45.html" }, { "name": "21532", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/21532" }, { "name": "21270", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/21270" }, { "name": "ADV-2008-0083", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/0083" }, { "name": "USN-327-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/327-1/" }, { "name": "21361", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/21361" }, { "name": "21631", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/21631" }, { "name": "SSRT061181", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/446658/100/200/threaded" }, { "name": "21246", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/21246" }, { "name": "SUSE-SA:2006:048", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://www.novell.com/linux/security/advisories/2006_48_seamonkey.html" }, { "name": "21229", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/21229" }, { "name": "1016587", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1016587" }, { "name": "HPSBUX02153", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/446658/100/200/threaded" }, { "name": "RHSA-2006:0611", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2006-0611.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://issues.rpath.com/browse/RPL-536" }, { "name": "22066", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/22066" }, { "name": "21269", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/21269" }, { "name": "21343", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/21343" }, { "name": "MDKSA-2006:143", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:143" }, { "name": "19192", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/19192" }, { "name": "USN-354-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/usn-354-1" }, { "name": "20060703-01-P", "tags": [ "vendor-advisory", "x_refsource_SGI", "x_transferred" ], "url": "ftp://patches.sgi.com/support/free/security/advisories/20060703-01-U.asc" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2006-07-27T00:00:00", "descriptions": [ { "lang": "en", "value": "Mozilla Firefox 1.5 before 1.5.0.5 and SeaMonkey before 1.0.3 allows remote attackers to execute arbitrary code by changing certain properties of the window navigator object (window.navigator) that are accessed when Java starts up, which causes a crash that leads to code execution." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-18T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20060726 ZDI-06-025: Mozilla Firefox Javascript navigator Object Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/441332/100/0/threaded" }, { "name": "21243", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/21243" }, { "name": "RHSA-2006:0608", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2006-0608.html" }, { "name": "GLSA-200608-02", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200608-02.xml" }, { "name": "MDKSA-2006:145", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:145" }, { "name": "ADV-2006-3748", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/3748" }, { "name": "iphone-mobilesafari-dos(39998)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39998" }, { "name": "19181", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/19181" }, { "name": "mozilla-javascript-navigator-code-excecution(27981)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27981" }, { "name": "TA06-208A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA06-208A.html" }, { "name": "ADV-2006-2998", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/2998" }, { "name": "20060727 rPSA-2006-0137-1 firefox", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/441333/100/0/threaded" }, { "name": "21529", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/21529" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.zerodayinitiative.com/advisories/ZDI-06-025.html" }, { "name": "oval:org.mitre.oval:def:10745", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10745" }, { "name": "21216", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/21216" }, { "name": "GLSA-200608-03", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200608-03.xml" }, { "name": "RHSA-2006:0594", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2006-0594.html" }, { "name": "21336", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/21336" }, { "name": "RHSA-2006:0610", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2006-0610.html" }, { "name": "VU#670060", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/670060" }, { "name": "RHSA-2006:0609", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2006-0609.html" }, { "name": "22210", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/22210" }, { "name": "1016586", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1016586" }, { "name": "19873", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/19873" }, { "name": "21262", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/21262" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.mozilla.org/security/announce/2006/mfsa2006-45.html" }, { "name": "21532", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/21532" }, { "name": "21270", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/21270" }, { "name": "ADV-2008-0083", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/0083" }, { "name": "USN-327-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/327-1/" }, { "name": "21361", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/21361" }, { "name": "21631", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/21631" }, { "name": "SSRT061181", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://www.securityfocus.com/archive/1/446658/100/200/threaded" }, { "name": "21246", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/21246" }, { "name": "SUSE-SA:2006:048", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://www.novell.com/linux/security/advisories/2006_48_seamonkey.html" }, { "name": "21229", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/21229" }, { "name": "1016587", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1016587" }, { "name": "HPSBUX02153", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://www.securityfocus.com/archive/1/446658/100/200/threaded" }, { "name": "RHSA-2006:0611", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2006-0611.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://issues.rpath.com/browse/RPL-536" }, { "name": "22066", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/22066" }, { "name": "21269", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/21269" }, { "name": "21343", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/21343" }, { "name": "MDKSA-2006:143", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:143" }, { "name": "19192", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/19192" }, { "name": "USN-354-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/usn-354-1" }, { "name": "20060703-01-P", "tags": [ "vendor-advisory", "x_refsource_SGI" ], "url": "ftp://patches.sgi.com/support/free/security/advisories/20060703-01-U.asc" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-3677", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Mozilla Firefox 1.5 before 1.5.0.5 and SeaMonkey before 1.0.3 allows remote attackers to execute arbitrary code by changing certain properties of the window navigator object (window.navigator) that are accessed when Java starts up, which causes a crash that leads to code execution." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20060726 ZDI-06-025: Mozilla Firefox Javascript navigator Object Vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/441332/100/0/threaded" }, { "name": "21243", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/21243" }, { "name": "RHSA-2006:0608", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2006-0608.html" }, { "name": "GLSA-200608-02", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200608-02.xml" }, { "name": "MDKSA-2006:145", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:145" }, { "name": "ADV-2006-3748", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2006/3748" }, { "name": "iphone-mobilesafari-dos(39998)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39998" }, { "name": "19181", "refsource": "BID", "url": "http://www.securityfocus.com/bid/19181" }, { "name": "mozilla-javascript-navigator-code-excecution(27981)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27981" }, { "name": "TA06-208A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA06-208A.html" }, { "name": "ADV-2006-2998", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2006/2998" }, { "name": "20060727 rPSA-2006-0137-1 firefox", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/441333/100/0/threaded" }, { "name": "21529", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/21529" }, { "name": "http://www.zerodayinitiative.com/advisories/ZDI-06-025.html", "refsource": "MISC", "url": "http://www.zerodayinitiative.com/advisories/ZDI-06-025.html" }, { "name": "oval:org.mitre.oval:def:10745", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10745" }, { "name": "21216", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/21216" }, { "name": "GLSA-200608-03", "refsource": "GENTOO", "url": "http://www.gentoo.org/security/en/glsa/glsa-200608-03.xml" }, { "name": "RHSA-2006:0594", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2006-0594.html" }, { "name": "21336", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/21336" }, { "name": "RHSA-2006:0610", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2006-0610.html" }, { "name": "VU#670060", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/670060" }, { "name": "RHSA-2006:0609", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2006-0609.html" }, { "name": "22210", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/22210" }, { "name": "1016586", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1016586" }, { "name": "19873", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/19873" }, { "name": "21262", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/21262" }, { "name": "http://www.mozilla.org/security/announce/2006/mfsa2006-45.html", "refsource": "CONFIRM", "url": "http://www.mozilla.org/security/announce/2006/mfsa2006-45.html" }, { "name": "21532", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/21532" }, { "name": "21270", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/21270" }, { "name": "ADV-2008-0083", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/0083" }, { "name": "USN-327-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/327-1/" }, { "name": "21361", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/21361" }, { "name": "21631", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/21631" }, { "name": "SSRT061181", "refsource": "HP", "url": "http://www.securityfocus.com/archive/1/446658/100/200/threaded" }, { "name": "21246", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/21246" }, { "name": "SUSE-SA:2006:048", "refsource": "SUSE", "url": "http://www.novell.com/linux/security/advisories/2006_48_seamonkey.html" }, { "name": "21229", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/21229" }, { "name": "1016587", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1016587" }, { "name": "HPSBUX02153", "refsource": "HP", "url": "http://www.securityfocus.com/archive/1/446658/100/200/threaded" }, { "name": "RHSA-2006:0611", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2006-0611.html" }, { "name": "https://issues.rpath.com/browse/RPL-536", "refsource": "CONFIRM", "url": "https://issues.rpath.com/browse/RPL-536" }, { "name": "22066", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/22066" }, { "name": "21269", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/21269" }, { "name": "21343", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/21343" }, { "name": "MDKSA-2006:143", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:143" }, { "name": "19192", "refsource": "BID", "url": "http://www.securityfocus.com/bid/19192" }, { "name": "USN-354-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/usn-354-1" }, { "name": "20060703-01-P", "refsource": "SGI", "url": "ftp://patches.sgi.com/support/free/security/advisories/20060703-01-U.asc" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2006-3677", "datePublished": "2006-07-27T19:00:00", "dateReserved": "2006-07-18T00:00:00", "dateUpdated": "2024-08-07T18:39:53.571Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2006-3677\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2006-07-27T19:04:00.000\",\"lastModified\":\"2025-04-03T01:03:51.193\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Mozilla Firefox 1.5 before 1.5.0.5 and SeaMonkey before 1.0.3 allows remote attackers to execute arbitrary code by changing certain properties of the window navigator object (window.navigator) that are accessed when Java starts up, which causes a crash that leads to code execution.\"},{\"lang\":\"es\",\"value\":\"Mozilla Firefox 1.5 anterior a 1.5.0.5 y SeaMonkey anterior a 1.0.3 permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n cambiando ciertas propiedades del objeto de la ventana de navegaci\u00f3n (window.navigator) que es accedido cuando comienza Java, lo cual provoca un caida que desemboca en una ejecuci\u00f3n de c\u00f3digo.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":7.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":true,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-16\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ABB88E86-6E83-4A59-9266-8B98AA91774D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:1.5.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7D6BF5B1-86D1-47FE-9D9C-735718F94874\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:1.5.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"84D15CE0-69DF-4EFD-801E-96A4D6AABEDB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:1.5.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CEE203DE-6C0E-4FDE-9C3A-0E73430F17DA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:1.5.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F2F38886-C25A-4C6B-93E7-36461405BA99\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"09E18FC0-0C8C-4FA1-85B9-B868D00F002F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:1.0:*:dev:*:*:*:*:*\",\"matchCriteriaId\":\"55344F76-1C42-4DD8-A28B-1C33626C6FD2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6521C877-63C9-4B6E-9FC9-1263FFBB7950\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D949DF0A-CBC2-40E1-AE6C-60E6F58D2481\"}]}]}],\"references\":[{\"url\":\"ftp://patches.sgi.com/support/free/security/advisories/20060703-01-U.asc\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2006-0609.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/19873\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/21216\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/21229\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/21243\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/21246\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/21262\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/21269\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/21270\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/21336\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/21343\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/21361\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/21529\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/21532\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/21631\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/22066\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/22210\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://security.gentoo.org/glsa/glsa-200608-02.xml\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://securitytracker.com/id?1016586\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://securitytracker.com/id?1016587\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.gentoo.org/security/en/glsa/glsa-200608-03.xml\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.kb.cert.org/vuls/id/670060\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2006:143\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2006:145\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.mozilla.org/security/announce/2006/mfsa2006-45.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.novell.com/linux/security/advisories/2006_48_seamonkey.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2006-0594.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2006-0608.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2006-0610.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2006-0611.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/archive/1/441332/100/0/threaded\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/archive/1/441333/100/0/threaded\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/archive/1/446658/100/200/threaded\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/archive/1/446658/100/200/threaded\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/19181\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/19192\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.ubuntu.com/usn/usn-354-1\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.us-cert.gov/cas/techalerts/TA06-208A.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.vupen.com/english/advisories/2006/2998\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2006/3748\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2008/0083\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.zerodayinitiative.com/advisories/ZDI-06-025.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/27981\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/39998\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://issues.rpath.com/browse/RPL-536\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10745\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://usn.ubuntu.com/327-1/\",\"source\":\"cve@mitre.org\"},{\"url\":\"ftp://patches.sgi.com/support/free/security/advisories/20060703-01-U.asc\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2006-0609.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/19873\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/21216\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/21229\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/21243\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/21246\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/21262\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/21269\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/21270\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/21336\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/21343\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/21361\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/21529\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/21532\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/21631\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/22066\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/22210\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://security.gentoo.org/glsa/glsa-200608-02.xml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://securitytracker.com/id?1016586\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://securitytracker.com/id?1016587\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.gentoo.org/security/en/glsa/glsa-200608-03.xml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.kb.cert.org/vuls/id/670060\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2006:143\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2006:145\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.mozilla.org/security/announce/2006/mfsa2006-45.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.novell.com/linux/security/advisories/2006_48_seamonkey.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2006-0594.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2006-0608.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2006-0610.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2006-0611.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/archive/1/441332/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/441333/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/446658/100/200/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/446658/100/200/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/19181\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/19192\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.ubuntu.com/usn/usn-354-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.us-cert.gov/cas/techalerts/TA06-208A.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.vupen.com/english/advisories/2006/2998\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2006/3748\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2008/0083\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.zerodayinitiative.com/advisories/ZDI-06-025.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/27981\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/39998\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://issues.rpath.com/browse/RPL-536\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10745\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://usn.ubuntu.com/327-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
RHSA-2006:0594
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated seamonkey packages that fix several security bugs in the mozilla\npackages are now available for Red Hat Enterprise Linux 2.1.\n\nThis update has been rated as having critical security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "SeaMonkey is an open source Web browser, advanced email and newsgroup\nclient, IRC chat client, and HTML editor.\n\nThe Mozilla Foundation has discontinued support for the Mozilla Suite. This\nupdate deprecates the Mozilla Suite in Red Hat Enterprise Linux 2.1 in\nfavor of the supported SeaMonkey Suite.\n\nThis update also resolves a number of outstanding Mozilla security issues:\n\nSeveral flaws were found in the way SeaMonkey processed certain javascript\nactions. A malicious web page could execute arbitrary javascript\ninstructions with the permissions of \"chrome\", allowing the page to steal\nsensitive information or install browser malware. (CVE-2006-2776,\nCVE-2006-2784, CVE-2006-2785, CVE-2006-2787, CVE-2006-3807, CVE-2006-3809,\nCVE-2006-3812)\n\nSeveral denial of service flaws were found in the way SeaMonkey processed\ncertain web content. A malicious web page could crash the browser or\npossibly execute arbitrary code as the user running SeaMonkey.\n(CVE-2006-2779, CVE-2006-2780, CVE-2006-3801, CVE-2006-3677, CVE-2006-3113,\nCVE-2006-3803, CVE-2006-3805, CVE-2006-3806, CVE-2006-3811)\n\nTwo flaws were found in the way SeaMonkey Messenger displayed malformed\ninline vcard attachments. If a victim viewed an email message containing\na carefully crafted vcard it was possible to execute arbitrary code as the\nuser running SeaMonkey Messenger. (CVE-2006-2781, CVE-2006-3804)\n\nA cross-site scripting flaw was found in the way SeaMonkey processed\nUnicode Byte-Order-Mark (BOM) markers in UTF-8 web pages. A malicious web\npage could execute a script within the browser that a web input sanitizer\ncould miss due to a malformed \"script\" tag. (CVE-2006-2783)\n\nSeveral flaws were found in the way SeaMonkey processed certain javascript\nactions. A malicious web page could conduct a cross-site scripting attack\nor steal sensitive information (such as cookies owned by other domains).\n(CVE-2006-3802, CVE-2006-3810)\n\nA form file upload flaw was found in the way SeaMonkey handled javascript\ninput object mutation. A malicious web page could upload an arbitrary local\nfile at form submission time without user interaction. (CVE-2006-2782)\n\nA denial of service flaw was found in the way SeaMonkey called the\ncrypto.signText() javascript function. A malicious web page could crash the\nbrowser if the victim had a client certificate loaded. (CVE-2006-2778)\n\nTwo HTTP response smuggling flaws were found in the way SeaMonkey processed\ncertain invalid HTTP response headers. A malicious web site could return\nspecially crafted HTTP response headers which may bypass HTTP proxy\nrestrictions. (CVE-2006-2786)\n\nA flaw was found in the way SeaMonkey processed Proxy AutoConfig scripts. A\nmalicious Proxy AutoConfig server could execute arbitrary javascript\ninstructions with the permissions of \"chrome\", allowing the page to steal\nsensitive information or install browser malware. (CVE-2006-3808)\n\nA double free flaw was found in the way the nsIX509::getRawDER method was\ncalled. If a victim visited a carefully crafted web page it was possible to\nexecute arbitrary code as the user running SeaMonkey. (CVE-2006-2788)\n\nUsers of Mozilla are advised to upgrade to this update, which contains\nSeaMonkey version 1.0.3 that corrects these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2006:0594", "url": "https://access.redhat.com/errata/RHSA-2006:0594" }, { "category": "external", "summary": "http://www.redhat.com/security/updates/classification/#critical", "url": "http://www.redhat.com/security/updates/classification/#critical" }, { "category": "external", "summary": "198686", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=198686" }, { "category": "external", "summary": "198687", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=198687" }, { "category": "external", "summary": "200167", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=200167" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2006/rhsa-2006_0594.json" } ], "title": "Red Hat Security Advisory: seamonkey security update (was mozilla)", "tracking": { "current_release_date": "2025-09-10T13:38:38+00:00", "generator": { "date": "2025-09-10T13:38:38+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.7" } }, "id": "RHSA-2006:0594", "initial_release_date": "2006-08-28T11:30:00+00:00", "revision_history": [ { "date": "2006-08-28T11:30:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2006-09-15T09:27:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-09-10T13:38:38+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product": { "name": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::as" } } }, { "category": "product_name", "name": "Red Hat Linux Advanced Workstation 2.1", "product": { "name": "Red Hat Linux Advanced Workstation 2.1", "product_id": "Red Hat Linux Advanced Workstation 2.1", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::aw" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 2.1", "product": { "name": "Red Hat Enterprise Linux ES version 2.1", "product_id": "Red Hat Enterprise Linux ES version 2.1", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 2.1", "product": { "name": "Red Hat Enterprise Linux WS version 2.1", "product_id": "Red Hat Enterprise Linux WS version 2.1", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::ws" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2006-2776", "discovery_date": "2006-05-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618112" } ], "notes": [ { "category": "description", "text": "Certain privileged UI code in Mozilla Firefox and Thunderbird before 1.5.0.4 calls content-defined setters on an object prototype, which allows remote attackers to execute code at a higher privilege than intended.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2776" }, { "category": "external", "summary": "RHBZ#1618112", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618112" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2776", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2776" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2776", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2776" } ], "release_date": "2006-06-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-08-28T11:30:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0594" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2006-2778", "discovery_date": "2006-05-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618113" } ], "notes": [ { "category": "description", "text": "The crypto.signText function in Mozilla Firefox and Thunderbird before 1.5.0.4 allows remote attackers to execute arbitrary code via certain optional Certificate Authority name arguments, which causes an invalid array index and triggers a buffer overflow.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2778" }, { "category": "external", "summary": "RHBZ#1618113", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618113" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2778", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2778" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2778", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2778" } ], "release_date": "2006-06-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-08-28T11:30:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0594" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2006-2779", "discovery_date": "2006-06-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618114" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox and Thunderbird before 1.5.0.4 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via (1) nested \u003coption\u003e tags in a select tag, (2) a DOMNodeRemoved mutation event, (3) \"Content-implemented tree views,\" (4) BoxObjects, (5) the XBL implementation, (6) an iframe that attempts to remove itself, which leads to memory corruption.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2779" }, { "category": "external", "summary": "RHBZ#1618114", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618114" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2779", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2779" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2779", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2779" } ], "release_date": "2006-06-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-08-28T11:30:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0594" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-2780", "discovery_date": "2006-06-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618115" } ], "notes": [ { "category": "description", "text": "Integer overflow in Mozilla Firefox and Thunderbird before 1.5.0.4 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via \"jsstr tagify,\" which leads to memory corruption.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2780" }, { "category": "external", "summary": "RHBZ#1618115", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618115" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2780", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2780" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2780", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2780" } ], "release_date": "2006-06-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-08-28T11:30:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0594" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-2781", "discovery_date": "2006-06-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "193963" } ], "notes": [ { "category": "description", "text": "Double free vulnerability in nsVCard.cpp in Mozilla Thunderbird before 1.5.0.4 and SeaMonkey before 1.0.2 allows remote attackers to cause a denial of service (hang) and possibly execute arbitrary code via a VCard that contains invalid base64 characters.", "title": "Vulnerability description" }, { "category": "summary", "text": "(seamonkey): DOS/arbitrary code execution vuln with vcards", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2781" }, { "category": "external", "summary": "RHBZ#193963", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=193963" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2781", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2781" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2781", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2781" } ], "release_date": "2006-06-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-08-28T11:30:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0594" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "(seamonkey): DOS/arbitrary code execution vuln with vcards" }, { "cve": "CVE-2006-2782", "discovery_date": "2006-05-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618116" } ], "notes": [ { "category": "description", "text": "Firefox 1.5.0.2 does not fix all test cases associated with CVE-2006-1729, which allows remote attackers to read arbitrary files by inserting the target filename into a text box, then turning that box into a file upload control.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2782" }, { "category": "external", "summary": "RHBZ#1618116", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618116" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2782", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2782" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2782", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2782" } ], "release_date": "2006-06-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-08-28T11:30:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0594" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2006-2783", "discovery_date": "2006-05-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618117" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox and Thunderbird before 1.5.0.4 strip the Unicode Byte-order-Mark (BOM) from a UTF-8 page before the page is passed to the parser, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a BOM sequence in the middle of a dangerous tag such as SCRIPT.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2783" }, { "category": "external", "summary": "RHBZ#1618117", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618117" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2783", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2783" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2783", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2783" } ], "release_date": "2006-06-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-08-28T11:30:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0594" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2006-2784", "discovery_date": "2006-05-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618118" } ], "notes": [ { "category": "description", "text": "The PLUGINSPAGE functionality in Mozilla Firefox before 1.5.0.4 allows remote user-assisted attackers to execute privileged code by tricking a user into installing missing plugins and selecting the \"Manual Install\" button, then using nested javascript: URLs. NOTE: the manual install button is used for downloading software from a remote web site, so this issue would not cross privilege boundaries if the user progresses to the point of installing malicious software from the attacker-controlled site.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2784" }, { "category": "external", "summary": "RHBZ#1618118", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618118" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2784", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2784" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2784", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2784" } ], "release_date": "2006-06-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-08-28T11:30:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0594" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2006-2785", "discovery_date": "2006-05-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618119" } ], "notes": [ { "category": "description", "text": "Cross-site scripting (XSS) vulnerability in Mozilla Firefox before 1.5.0.4 allows user-assisted remote attackers to inject arbitrary web script or HTML by tricking a user into (1) performing a \"View Image\" on a broken image in which the SRC attribute contains a Javascript URL, or (2) selecting \"Show only this frame\" on a frame whose SRC attribute contains a Javascript URL.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2785" }, { "category": "external", "summary": "RHBZ#1618119", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618119" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2785", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2785" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2785", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2785" } ], "release_date": "2006-06-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-08-28T11:30:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0594" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2006-2786", "discovery_date": "2006-05-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618120" } ], "notes": [ { "category": "description", "text": "HTTP response smuggling vulnerability in Mozilla Firefox and Thunderbird before 1.5.0.4, when used with certain proxy servers, allows remote attackers to cause Firefox to interpret certain responses as if they were responses from two different sites via (1) invalid HTTP response headers with spaces between the header name and the colon, which might not be ignored in some cases, or (2) HTTP 1.1 headers through an HTTP 1.0 proxy, which are ignored by the proxy but processed by the client.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2786" }, { "category": "external", "summary": "RHBZ#1618120", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618120" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2786", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2786" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2786", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2786" } ], "release_date": "2006-06-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-08-28T11:30:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0594" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2006-2787", "discovery_date": "2006-05-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618121" } ], "notes": [ { "category": "description", "text": "EvalInSandbox in Mozilla Firefox and Thunderbird before 1.5.0.4 allows remote attackers to gain privileges via javascript that calls the valueOf method on objects that were created outside of the sandbox.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2787" }, { "category": "external", "summary": "RHBZ#1618121", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618121" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2787", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2787" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2787", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2787" } ], "release_date": "2006-06-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-08-28T11:30:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0594" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2006-2788", "discovery_date": "2006-05-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618122" } ], "notes": [ { "category": "description", "text": "Double free vulnerability in the getRawDER function for nsIX509Cert in Firefox allows remote attackers to cause a denial of service (hang) and possibly execute arbitrary code via certain Javascript code.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2788" }, { "category": "external", "summary": "RHBZ#1618122", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618122" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2788", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2788" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2788", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2788" } ], "release_date": "2006-06-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-08-28T11:30:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0594" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2006-3113", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618135" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox 1.5 before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via simultaneous XPCOM events, which causes a timer object to be deleted in a way that triggers memory corruption.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3113" }, { "category": "external", "summary": "RHBZ#1618135", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618135" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3113", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3113" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3113", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3113" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-08-28T11:30:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0594" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-3677", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618153" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox 1.5 before 1.5.0.5 and SeaMonkey before 1.0.3 allows remote attackers to execute arbitrary code by changing certain properties of the window navigator object (window.navigator) that are accessed when Java starts up, which causes a crash that leads to code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3677" }, { "category": "external", "summary": "RHBZ#1618153", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618153" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3677", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3677" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3677", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3677" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-08-28T11:30:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0594" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-3801", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618161" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox 1.5 before 1.5.0.5 and SeaMonkey before 1.0.3 does not properly clear a JavaScript reference to a frame or window, which leaves a pointer to a deleted object that allows remote attackers to execute arbitrary native code.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3801" }, { "category": "external", "summary": "RHBZ#1618161", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618161" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3801", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3801" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3801", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3801" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-08-28T11:30:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0594" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-3802", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618162" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to hijack native DOM methods from objects in another domain and conduct cross-site scripting (XSS) attacks using DOM methods of the top-level object.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3802" }, { "category": "external", "summary": "RHBZ#1618162", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618162" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3802", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3802" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3802", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3802" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-08-28T11:30:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0594" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2006-3803", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618163" } ], "notes": [ { "category": "description", "text": "Race condition in the JavaScript garbage collection in Mozilla Firefox 1.5 before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 might allow remote attackers to execute arbitrary code by causing the garbage collector to delete a temporary variable while it is still being used during the creation of a new Function object.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3803" }, { "category": "external", "summary": "RHBZ#1618163", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618163" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3803", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3803" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3803", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3803" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-08-28T11:30:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0594" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-3804", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618164" } ], "notes": [ { "category": "description", "text": "Heap-based buffer overflow in Mozilla Thunderbird before 1.5.0.5 and SeaMonkey before 1.0.3 allows remote attackers to cause a denial of service (crash) via a VCard attachment with a malformed base64 field, which copies more data than expected due to an integer underflow.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3804" }, { "category": "external", "summary": "RHBZ#1618164", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618164" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3804", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3804" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3804", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3804" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-08-28T11:30:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0594" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-3805", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618165" } ], "notes": [ { "category": "description", "text": "The Javascript engine in Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 might allow remote attackers to execute arbitrary code via vectors involving garbage collection that causes deletion of a temporary object that is still being used.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3805" }, { "category": "external", "summary": "RHBZ#1618165", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618165" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3805", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3805" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3805", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3805" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-08-28T11:30:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0594" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-3806", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618166" } ], "notes": [ { "category": "description", "text": "Multiple integer overflows in the Javascript engine in Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 might allow remote attackers to execute arbitrary code via vectors involving (1) long strings in the toSource method of the Object, Array, and String objects; and (2) unspecified \"string function arguments.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3806" }, { "category": "external", "summary": "RHBZ#1618166", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618166" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3806", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3806" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3806", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3806" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-08-28T11:30:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0594" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-3807", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618167" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to execute arbitrary code via script that changes the standard Object() constructor to return a reference to a privileged object and calling \"named JavaScript functions\" that use the constructor.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3807" }, { "category": "external", "summary": "RHBZ#1618167", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618167" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3807", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3807" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3807", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3807" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-08-28T11:30:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0594" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-3808", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618168" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox before 1.5.0.5 and SeaMonkey before 1.0.3 allows remote Proxy AutoConfig (PAC) servers to execute code with elevated privileges via a PAC script that sets the FindProxyForURL function to an eval method on a privileged object.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3808" }, { "category": "external", "summary": "RHBZ#1618168", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618168" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3808", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3808" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3808", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3808" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-08-28T11:30:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0594" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2006-3809", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618169" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows scripts with the UniversalBrowserRead privilege to gain UniversalXPConnect privileges and possibly execute code or obtain sensitive data by reading into a privileged context.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3809" }, { "category": "external", "summary": "RHBZ#1618169", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618169" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3809", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3809" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3809", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3809" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-08-28T11:30:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0594" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-3810", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618170" } ], "notes": [ { "category": "description", "text": "Cross-site scripting (XSS) vulnerability in Mozilla Firefox 1.5 before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to inject arbitrary web script or HTML via the XPCNativeWrapper(window).Function construct.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3810" }, { "category": "external", "summary": "RHBZ#1618170", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618170" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3810", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3810" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3810", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3810" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-08-28T11:30:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0594" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2006-3811", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618171" } ], "notes": [ { "category": "description", "text": "Multiple vulnerabilities in Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via Javascript that leads to memory corruption, including (1) nsListControlFrame::FireMenuItemActiveEvent, (2) buffer overflows in the string class in out-of-memory conditions, (3) table row and column groups, (4) \"anonymous box selectors outside of UA stylesheets,\" (5) stale references to \"removed nodes,\" and (6) running the crypto.generateCRMFRequest callback on deleted context.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3811" }, { "category": "external", "summary": "RHBZ#1618171", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618171" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3811", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3811" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3811", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3811" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-08-28T11:30:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0594" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-3812", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "200455" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to reference remote files and possibly load chrome: URLs by tricking the user into copying or dragging links.", "title": "Vulnerability description" }, { "category": "summary", "text": "vulnerabilities: CVE-2006-{3113,3677,3801-3812}", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3812" }, { "category": "external", "summary": "RHBZ#200455", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=200455" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3812", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3812" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3812", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3812" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-08-28T11:30:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0594" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "vulnerabilities: CVE-2006-{3113,3677,3801-3812}" } ] }
rhsa-2006_0611
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated thunderbird packages that fix several security bugs are now\navailable for Red Hat Enterprise Linux 4.\n\nThis update has been rated as having critical security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "Mozilla Thunderbird is a standalone mail and newsgroup client.\n\nThe Mozilla Foundation has discontinued support for the Mozilla Thunderbird\n1.0 branch. This update deprecates the Mozilla Thunderbird 1.0 branch in\nRed Hat Enterprise Linux 4 in favor of the supported Mozilla Thunderbird\n1.5 branch.\n\nThis update also resolves a number of outstanding Thunderbird security issues:\n\nSeveral flaws were found in the way Thunderbird processed certain\njavascript actions. A malicious mail message could execute arbitrary\njavascript instructions with the permissions of \"chrome\", allowing the page\nto steal sensitive information or install browser malware. (CVE-2006-2776,\nCVE-2006-2784, CVE-2006-2785, CVE-2006-2787, CVE-2006-3807, CVE-2006-3809)\n\nSeveral denial of service flaws were found in the way Thunderbird processed\ncertain mail messages. A malicious web page could crash the browser or\npossibly execute arbitrary code as the user running Thunderbird.\n(CVE-2006-2779, CVE-2006-2780, CVE-2006-3801, CVE-2006-3677,\nCVE-2006-3113, CVE-2006-3803, CVE-2006-3805, CVE-2006-3806, CVE-2006-3811)\n\nSeveral flaws were found in the way Thunderbird processed certain\njavascript actions. A malicious mail message could conduct a cross-site\nscripting attack or steal sensitive information (such as cookies owned by\nother domains). (CVE-2006-3802, CVE-2006-3810)\n\nA form file upload flaw was found in the way Thunderbird handled javascript\ninput object mutation. A malicious mail message could upload an arbitrary\nlocal file at form submission time without user interaction. (CVE-2006-2782)\n\nA denial of service flaw was found in the way Thunderbird called the\ncrypto.signText() javascript function. A malicious mail message could crash\nthe browser if the victim had a client certificate loaded. (CVE-2006-2778)\n\nA flaw was found in the way Thunderbird processed Proxy AutoConfig scripts.\nA malicious Proxy AutoConfig server could execute arbitrary javascript\ninstructions with the permissions of \"chrome\", allowing the page to steal\nsensitive information or install client malware. (CVE-2006-3808)\n\nNote: Please note that JavaScript support is disabled by default in\nThunderbird. The above issues are not exploitable with JavaScript disabled. \n\nTwo flaws were found in the way Thunderbird displayed malformed inline\nvcard attachments. If a victim viewed an email message containing a\ncarefully crafted vcard it was possible to execute arbitrary code as the\nuser running Thunderbird. (CVE-2006-2781, CVE-2006-3804)\n\nA cross site scripting flaw was found in the way Thunderbird processed\nUnicode Byte-order-Mark (BOM) markers in UTF-8 mail messages. A malicious\nweb page could execute a script within the browser that a web input\nsanitizer could miss due to a malformed \"script\" tag. (CVE-2006-2783)\n\nTwo HTTP response smuggling flaws were found in the way Thunderbird\nprocessed certain invalid HTTP response headers. A malicious web site could\nreturn specially crafted HTTP response headers which may bypass HTTP proxy\nrestrictions. (CVE-2006-2786)\n\nA double free flaw was found in the way the nsIX509::getRawDER method was\ncalled. If a victim visited a carefully crafted web page, it was possible\nto crash Thunderbird. (CVE-2006-2788)\n\nUsers of Thunderbird are advised to upgrade to this update, which contains\nThunderbird version 1.5.0.5 that corrects these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2006:0611", "url": "https://access.redhat.com/errata/RHSA-2006:0611" }, { "category": "external", "summary": "http://www.redhat.com/security/updates/classification/#critical", "url": "http://www.redhat.com/security/updates/classification/#critical" }, { "category": "external", "summary": "197078", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=197078" }, { "category": "external", "summary": "200171", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=200171" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2006/rhsa-2006_0611.json" } ], "title": "Red Hat Security Advisory: thunderbird security update", "tracking": { "current_release_date": "2024-11-22T00:27:24+00:00", "generator": { "date": "2024-11-22T00:27:24+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2006:0611", "initial_release_date": "2006-07-29T00:16:00+00:00", "revision_history": [ { "date": "2006-07-29T00:16:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2006-07-28T00:00:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T00:27:24+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 4", "product": { "name": "Red Hat Enterprise Linux AS version 4", "product_id": "4AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::as" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop version 4", "product": { "name": "Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 4", "product": { "name": "Red Hat Enterprise Linux ES version 4", "product_id": "4ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 4", "product": { "name": "Red Hat Enterprise Linux WS version 4", "product_id": "4WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::ws" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "thunderbird-0:1.5.0.5-0.el4.1.ia64", "product": { "name": "thunderbird-0:1.5.0.5-0.el4.1.ia64", "product_id": "thunderbird-0:1.5.0.5-0.el4.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird@1.5.0.5-0.el4.1?arch=ia64" } } }, { "category": "product_version", "name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "product": { "name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "product_id": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird-debuginfo@1.5.0.5-0.el4.1?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "thunderbird-0:1.5.0.5-0.el4.1.src", "product": { "name": "thunderbird-0:1.5.0.5-0.el4.1.src", "product_id": "thunderbird-0:1.5.0.5-0.el4.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird@1.5.0.5-0.el4.1?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "thunderbird-0:1.5.0.5-0.el4.1.x86_64", "product": { "name": "thunderbird-0:1.5.0.5-0.el4.1.x86_64", "product_id": "thunderbird-0:1.5.0.5-0.el4.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird@1.5.0.5-0.el4.1?arch=x86_64" } } }, { "category": "product_version", "name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "product": { "name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "product_id": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird-debuginfo@1.5.0.5-0.el4.1?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "thunderbird-0:1.5.0.5-0.el4.1.i386", "product": { "name": "thunderbird-0:1.5.0.5-0.el4.1.i386", "product_id": "thunderbird-0:1.5.0.5-0.el4.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird@1.5.0.5-0.el4.1?arch=i386" } } }, { "category": "product_version", "name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "product": { "name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "product_id": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird-debuginfo@1.5.0.5-0.el4.1?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "thunderbird-0:1.5.0.5-0.el4.1.ppc", "product": { "name": "thunderbird-0:1.5.0.5-0.el4.1.ppc", "product_id": "thunderbird-0:1.5.0.5-0.el4.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird@1.5.0.5-0.el4.1?arch=ppc" } } }, { "category": "product_version", "name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "product": { "name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "product_id": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird-debuginfo@1.5.0.5-0.el4.1?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "thunderbird-0:1.5.0.5-0.el4.1.s390x", "product": { "name": "thunderbird-0:1.5.0.5-0.el4.1.s390x", "product_id": "thunderbird-0:1.5.0.5-0.el4.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird@1.5.0.5-0.el4.1?arch=s390x" } } }, { "category": "product_version", "name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "product": { "name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "product_id": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird-debuginfo@1.5.0.5-0.el4.1?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "thunderbird-0:1.5.0.5-0.el4.1.s390", "product": { "name": "thunderbird-0:1.5.0.5-0.el4.1.s390", "product_id": "thunderbird-0:1.5.0.5-0.el4.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird@1.5.0.5-0.el4.1?arch=s390" } } }, { "category": "product_version", "name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "product": { "name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "product_id": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird-debuginfo@1.5.0.5-0.el4.1?arch=s390" } } } ], "category": "architecture", "name": "s390" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.5-0.el4.1.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:thunderbird-0:1.5.0.5-0.el4.1.i386" }, "product_reference": "thunderbird-0:1.5.0.5-0.el4.1.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.5-0.el4.1.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64" }, "product_reference": "thunderbird-0:1.5.0.5-0.el4.1.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.5-0.el4.1.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc" }, "product_reference": "thunderbird-0:1.5.0.5-0.el4.1.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.5-0.el4.1.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390" }, "product_reference": "thunderbird-0:1.5.0.5-0.el4.1.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.5-0.el4.1.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x" }, "product_reference": "thunderbird-0:1.5.0.5-0.el4.1.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.5-0.el4.1.src as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:thunderbird-0:1.5.0.5-0.el4.1.src" }, "product_reference": "thunderbird-0:1.5.0.5-0.el4.1.src", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.5-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64" }, "product_reference": "thunderbird-0:1.5.0.5-0.el4.1.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386" }, "product_reference": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64" }, "product_reference": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc" }, "product_reference": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390" }, "product_reference": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x" }, "product_reference": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" }, "product_reference": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.5-0.el4.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386" }, "product_reference": "thunderbird-0:1.5.0.5-0.el4.1.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.5-0.el4.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64" }, "product_reference": "thunderbird-0:1.5.0.5-0.el4.1.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.5-0.el4.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc" }, "product_reference": "thunderbird-0:1.5.0.5-0.el4.1.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.5-0.el4.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390" }, "product_reference": "thunderbird-0:1.5.0.5-0.el4.1.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.5-0.el4.1.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x" }, "product_reference": "thunderbird-0:1.5.0.5-0.el4.1.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.5-0.el4.1.src as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src" }, "product_reference": "thunderbird-0:1.5.0.5-0.el4.1.src", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.5-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64" }, "product_reference": "thunderbird-0:1.5.0.5-0.el4.1.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386" }, "product_reference": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64" }, "product_reference": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc" }, "product_reference": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390" }, "product_reference": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x" }, "product_reference": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" }, "product_reference": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.5-0.el4.1.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:thunderbird-0:1.5.0.5-0.el4.1.i386" }, "product_reference": "thunderbird-0:1.5.0.5-0.el4.1.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.5-0.el4.1.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64" }, "product_reference": "thunderbird-0:1.5.0.5-0.el4.1.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.5-0.el4.1.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc" }, "product_reference": "thunderbird-0:1.5.0.5-0.el4.1.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.5-0.el4.1.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390" }, "product_reference": "thunderbird-0:1.5.0.5-0.el4.1.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.5-0.el4.1.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x" }, "product_reference": "thunderbird-0:1.5.0.5-0.el4.1.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.5-0.el4.1.src as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:thunderbird-0:1.5.0.5-0.el4.1.src" }, "product_reference": "thunderbird-0:1.5.0.5-0.el4.1.src", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.5-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64" }, "product_reference": "thunderbird-0:1.5.0.5-0.el4.1.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386" }, "product_reference": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64" }, "product_reference": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc" }, "product_reference": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390" }, "product_reference": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x" }, "product_reference": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" }, "product_reference": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.5-0.el4.1.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:thunderbird-0:1.5.0.5-0.el4.1.i386" }, "product_reference": "thunderbird-0:1.5.0.5-0.el4.1.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.5-0.el4.1.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64" }, "product_reference": "thunderbird-0:1.5.0.5-0.el4.1.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.5-0.el4.1.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc" }, "product_reference": "thunderbird-0:1.5.0.5-0.el4.1.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.5-0.el4.1.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390" }, "product_reference": "thunderbird-0:1.5.0.5-0.el4.1.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.5-0.el4.1.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x" }, "product_reference": "thunderbird-0:1.5.0.5-0.el4.1.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.5-0.el4.1.src as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:thunderbird-0:1.5.0.5-0.el4.1.src" }, "product_reference": "thunderbird-0:1.5.0.5-0.el4.1.src", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.5-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64" }, "product_reference": "thunderbird-0:1.5.0.5-0.el4.1.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386" }, "product_reference": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64" }, "product_reference": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc" }, "product_reference": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390" }, "product_reference": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x" }, "product_reference": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" }, "product_reference": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "relates_to_product_reference": "4WS" } ] }, "vulnerabilities": [ { "cve": "CVE-2006-2776", "discovery_date": "2006-05-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618112" } ], "notes": [ { "category": "description", "text": "Certain privileged UI code in Mozilla Firefox and Thunderbird before 1.5.0.4 calls content-defined setters on an object prototype, which allows remote attackers to execute code at a higher privilege than intended.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-0:1.5.0.5-0.el4.1.src", "4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-0:1.5.0.5-0.el4.1.src", "4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-0:1.5.0.5-0.el4.1.src", "4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2776" }, { "category": "external", "summary": "RHBZ#1618112", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618112" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2776", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2776" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2776", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2776" } ], "release_date": "2006-06-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-29T00:16:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-0:1.5.0.5-0.el4.1.src", "4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-0:1.5.0.5-0.el4.1.src", "4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-0:1.5.0.5-0.el4.1.src", "4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0611" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2006-2778", "discovery_date": "2006-05-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618113" } ], "notes": [ { "category": "description", "text": "The crypto.signText function in Mozilla Firefox and Thunderbird before 1.5.0.4 allows remote attackers to execute arbitrary code via certain optional Certificate Authority name arguments, which causes an invalid array index and triggers a buffer overflow.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-0:1.5.0.5-0.el4.1.src", "4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-0:1.5.0.5-0.el4.1.src", "4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-0:1.5.0.5-0.el4.1.src", "4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2778" }, { "category": "external", "summary": "RHBZ#1618113", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618113" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2778", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2778" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2778", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2778" } ], "release_date": "2006-06-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-29T00:16:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-0:1.5.0.5-0.el4.1.src", "4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-0:1.5.0.5-0.el4.1.src", "4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-0:1.5.0.5-0.el4.1.src", "4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0611" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2006-2779", "discovery_date": "2006-06-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618114" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox and Thunderbird before 1.5.0.4 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via (1) nested \u003coption\u003e tags in a select tag, (2) a DOMNodeRemoved mutation event, (3) \"Content-implemented tree views,\" (4) BoxObjects, (5) the XBL implementation, (6) an iframe that attempts to remove itself, which leads to memory corruption.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-0:1.5.0.5-0.el4.1.src", "4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-0:1.5.0.5-0.el4.1.src", "4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-0:1.5.0.5-0.el4.1.src", "4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2779" }, { "category": "external", "summary": "RHBZ#1618114", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618114" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2779", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2779" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2779", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2779" } ], "release_date": "2006-06-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-29T00:16:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-0:1.5.0.5-0.el4.1.src", "4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-0:1.5.0.5-0.el4.1.src", "4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-0:1.5.0.5-0.el4.1.src", "4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0611" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-2780", "discovery_date": "2006-06-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618115" } ], "notes": [ { "category": "description", "text": "Integer overflow in Mozilla Firefox and Thunderbird before 1.5.0.4 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via \"jsstr tagify,\" which leads to memory corruption.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-0:1.5.0.5-0.el4.1.src", "4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-0:1.5.0.5-0.el4.1.src", "4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-0:1.5.0.5-0.el4.1.src", "4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2780" }, { "category": "external", "summary": "RHBZ#1618115", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618115" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2780", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2780" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2780", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2780" } ], "release_date": "2006-06-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-29T00:16:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-0:1.5.0.5-0.el4.1.src", "4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-0:1.5.0.5-0.el4.1.src", "4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-0:1.5.0.5-0.el4.1.src", "4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0611" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-2781", "discovery_date": "2006-06-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "193963" } ], "notes": [ { "category": "description", "text": "Double free vulnerability in nsVCard.cpp in Mozilla Thunderbird before 1.5.0.4 and SeaMonkey before 1.0.2 allows remote attackers to cause a denial of service (hang) and possibly execute arbitrary code via a VCard that contains invalid base64 characters.", "title": "Vulnerability description" }, { "category": "summary", "text": "(seamonkey): DOS/arbitrary code execution vuln with vcards", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-0:1.5.0.5-0.el4.1.src", "4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-0:1.5.0.5-0.el4.1.src", "4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-0:1.5.0.5-0.el4.1.src", "4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2781" }, { "category": "external", "summary": "RHBZ#193963", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=193963" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2781", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2781" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2781", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2781" } ], "release_date": "2006-06-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-29T00:16:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-0:1.5.0.5-0.el4.1.src", "4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-0:1.5.0.5-0.el4.1.src", "4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-0:1.5.0.5-0.el4.1.src", "4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0611" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "(seamonkey): DOS/arbitrary code execution vuln with vcards" }, { "cve": "CVE-2006-2782", "discovery_date": "2006-05-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618116" } ], "notes": [ { "category": "description", "text": "Firefox 1.5.0.2 does not fix all test cases associated with CVE-2006-1729, which allows remote attackers to read arbitrary files by inserting the target filename into a text box, then turning that box into a file upload control.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-0:1.5.0.5-0.el4.1.src", "4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-0:1.5.0.5-0.el4.1.src", "4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-0:1.5.0.5-0.el4.1.src", "4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2782" }, { "category": "external", "summary": "RHBZ#1618116", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618116" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2782", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2782" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2782", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2782" } ], "release_date": "2006-06-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-29T00:16:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-0:1.5.0.5-0.el4.1.src", "4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-0:1.5.0.5-0.el4.1.src", "4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-0:1.5.0.5-0.el4.1.src", "4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0611" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2006-2783", "discovery_date": "2006-05-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618117" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox and Thunderbird before 1.5.0.4 strip the Unicode Byte-order-Mark (BOM) from a UTF-8 page before the page is passed to the parser, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a BOM sequence in the middle of a dangerous tag such as SCRIPT.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-0:1.5.0.5-0.el4.1.src", "4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-0:1.5.0.5-0.el4.1.src", "4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-0:1.5.0.5-0.el4.1.src", "4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2783" }, { "category": "external", "summary": "RHBZ#1618117", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618117" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2783", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2783" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2783", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2783" } ], "release_date": "2006-06-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-29T00:16:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-0:1.5.0.5-0.el4.1.src", "4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-0:1.5.0.5-0.el4.1.src", "4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-0:1.5.0.5-0.el4.1.src", "4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0611" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2006-2784", "discovery_date": "2006-05-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618118" } ], "notes": [ { "category": "description", "text": "The PLUGINSPAGE functionality in Mozilla Firefox before 1.5.0.4 allows remote user-assisted attackers to execute privileged code by tricking a user into installing missing plugins and selecting the \"Manual Install\" button, then using nested javascript: URLs. NOTE: the manual install button is used for downloading software from a remote web site, so this issue would not cross privilege boundaries if the user progresses to the point of installing malicious software from the attacker-controlled site.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-0:1.5.0.5-0.el4.1.src", "4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-0:1.5.0.5-0.el4.1.src", "4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-0:1.5.0.5-0.el4.1.src", "4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2784" }, { "category": "external", "summary": "RHBZ#1618118", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618118" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2784", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2784" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2784", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2784" } ], "release_date": "2006-06-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-29T00:16:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-0:1.5.0.5-0.el4.1.src", "4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-0:1.5.0.5-0.el4.1.src", "4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-0:1.5.0.5-0.el4.1.src", "4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0611" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2006-2785", "discovery_date": "2006-05-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618119" } ], "notes": [ { "category": "description", "text": "Cross-site scripting (XSS) vulnerability in Mozilla Firefox before 1.5.0.4 allows user-assisted remote attackers to inject arbitrary web script or HTML by tricking a user into (1) performing a \"View Image\" on a broken image in which the SRC attribute contains a Javascript URL, or (2) selecting \"Show only this frame\" on a frame whose SRC attribute contains a Javascript URL.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-0:1.5.0.5-0.el4.1.src", "4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-0:1.5.0.5-0.el4.1.src", "4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-0:1.5.0.5-0.el4.1.src", "4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2785" }, { "category": "external", "summary": "RHBZ#1618119", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618119" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2785", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2785" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2785", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2785" } ], "release_date": "2006-06-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-29T00:16:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-0:1.5.0.5-0.el4.1.src", "4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-0:1.5.0.5-0.el4.1.src", "4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-0:1.5.0.5-0.el4.1.src", "4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0611" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2006-2786", "discovery_date": "2006-05-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618120" } ], "notes": [ { "category": "description", "text": "HTTP response smuggling vulnerability in Mozilla Firefox and Thunderbird before 1.5.0.4, when used with certain proxy servers, allows remote attackers to cause Firefox to interpret certain responses as if they were responses from two different sites via (1) invalid HTTP response headers with spaces between the header name and the colon, which might not be ignored in some cases, or (2) HTTP 1.1 headers through an HTTP 1.0 proxy, which are ignored by the proxy but processed by the client.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-0:1.5.0.5-0.el4.1.src", "4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-0:1.5.0.5-0.el4.1.src", "4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-0:1.5.0.5-0.el4.1.src", "4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2786" }, { "category": "external", "summary": "RHBZ#1618120", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618120" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2786", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2786" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2786", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2786" } ], "release_date": "2006-06-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-29T00:16:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-0:1.5.0.5-0.el4.1.src", "4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-0:1.5.0.5-0.el4.1.src", "4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-0:1.5.0.5-0.el4.1.src", "4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0611" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2006-2787", "discovery_date": "2006-05-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618121" } ], "notes": [ { "category": "description", "text": "EvalInSandbox in Mozilla Firefox and Thunderbird before 1.5.0.4 allows remote attackers to gain privileges via javascript that calls the valueOf method on objects that were created outside of the sandbox.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-0:1.5.0.5-0.el4.1.src", "4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-0:1.5.0.5-0.el4.1.src", "4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-0:1.5.0.5-0.el4.1.src", "4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2787" }, { "category": "external", "summary": "RHBZ#1618121", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618121" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2787", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2787" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2787", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2787" } ], "release_date": "2006-06-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-29T00:16:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-0:1.5.0.5-0.el4.1.src", "4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-0:1.5.0.5-0.el4.1.src", "4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-0:1.5.0.5-0.el4.1.src", "4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0611" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2006-2788", "discovery_date": "2006-05-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618122" } ], "notes": [ { "category": "description", "text": "Double free vulnerability in the getRawDER function for nsIX509Cert in Firefox allows remote attackers to cause a denial of service (hang) and possibly execute arbitrary code via certain Javascript code.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-0:1.5.0.5-0.el4.1.src", "4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-0:1.5.0.5-0.el4.1.src", "4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-0:1.5.0.5-0.el4.1.src", "4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2788" }, { "category": "external", "summary": "RHBZ#1618122", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618122" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2788", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2788" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2788", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2788" } ], "release_date": "2006-06-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-29T00:16:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-0:1.5.0.5-0.el4.1.src", "4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-0:1.5.0.5-0.el4.1.src", "4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-0:1.5.0.5-0.el4.1.src", "4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0611" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2006-3113", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618135" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox 1.5 before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via simultaneous XPCOM events, which causes a timer object to be deleted in a way that triggers memory corruption.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-0:1.5.0.5-0.el4.1.src", "4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-0:1.5.0.5-0.el4.1.src", "4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-0:1.5.0.5-0.el4.1.src", "4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3113" }, { "category": "external", "summary": "RHBZ#1618135", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618135" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3113", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3113" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3113", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3113" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-29T00:16:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-0:1.5.0.5-0.el4.1.src", "4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-0:1.5.0.5-0.el4.1.src", "4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-0:1.5.0.5-0.el4.1.src", "4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0611" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-3677", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618153" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox 1.5 before 1.5.0.5 and SeaMonkey before 1.0.3 allows remote attackers to execute arbitrary code by changing certain properties of the window navigator object (window.navigator) that are accessed when Java starts up, which causes a crash that leads to code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-0:1.5.0.5-0.el4.1.src", "4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-0:1.5.0.5-0.el4.1.src", "4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-0:1.5.0.5-0.el4.1.src", "4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3677" }, { "category": "external", "summary": "RHBZ#1618153", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618153" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3677", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3677" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3677", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3677" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-29T00:16:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-0:1.5.0.5-0.el4.1.src", "4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-0:1.5.0.5-0.el4.1.src", "4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-0:1.5.0.5-0.el4.1.src", "4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0611" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-3801", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618161" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox 1.5 before 1.5.0.5 and SeaMonkey before 1.0.3 does not properly clear a JavaScript reference to a frame or window, which leaves a pointer to a deleted object that allows remote attackers to execute arbitrary native code.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-0:1.5.0.5-0.el4.1.src", "4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-0:1.5.0.5-0.el4.1.src", "4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-0:1.5.0.5-0.el4.1.src", "4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3801" }, { "category": "external", "summary": "RHBZ#1618161", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618161" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3801", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3801" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3801", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3801" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-29T00:16:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-0:1.5.0.5-0.el4.1.src", "4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-0:1.5.0.5-0.el4.1.src", "4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-0:1.5.0.5-0.el4.1.src", "4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0611" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-3802", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618162" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to hijack native DOM methods from objects in another domain and conduct cross-site scripting (XSS) attacks using DOM methods of the top-level object.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-0:1.5.0.5-0.el4.1.src", "4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-0:1.5.0.5-0.el4.1.src", "4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-0:1.5.0.5-0.el4.1.src", "4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3802" }, { "category": "external", "summary": "RHBZ#1618162", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618162" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3802", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3802" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3802", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3802" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-29T00:16:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-0:1.5.0.5-0.el4.1.src", "4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-0:1.5.0.5-0.el4.1.src", "4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-0:1.5.0.5-0.el4.1.src", "4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0611" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2006-3803", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618163" } ], "notes": [ { "category": "description", "text": "Race condition in the JavaScript garbage collection in Mozilla Firefox 1.5 before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 might allow remote attackers to execute arbitrary code by causing the garbage collector to delete a temporary variable while it is still being used during the creation of a new Function object.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-0:1.5.0.5-0.el4.1.src", "4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-0:1.5.0.5-0.el4.1.src", "4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-0:1.5.0.5-0.el4.1.src", "4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3803" }, { "category": "external", "summary": "RHBZ#1618163", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618163" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3803", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3803" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3803", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3803" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-29T00:16:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-0:1.5.0.5-0.el4.1.src", "4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-0:1.5.0.5-0.el4.1.src", "4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-0:1.5.0.5-0.el4.1.src", "4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0611" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-3804", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618164" } ], "notes": [ { "category": "description", "text": "Heap-based buffer overflow in Mozilla Thunderbird before 1.5.0.5 and SeaMonkey before 1.0.3 allows remote attackers to cause a denial of service (crash) via a VCard attachment with a malformed base64 field, which copies more data than expected due to an integer underflow.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-0:1.5.0.5-0.el4.1.src", "4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-0:1.5.0.5-0.el4.1.src", "4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-0:1.5.0.5-0.el4.1.src", "4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3804" }, { "category": "external", "summary": "RHBZ#1618164", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618164" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3804", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3804" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3804", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3804" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-29T00:16:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-0:1.5.0.5-0.el4.1.src", "4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-0:1.5.0.5-0.el4.1.src", "4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-0:1.5.0.5-0.el4.1.src", "4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0611" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-3805", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618165" } ], "notes": [ { "category": "description", "text": "The Javascript engine in Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 might allow remote attackers to execute arbitrary code via vectors involving garbage collection that causes deletion of a temporary object that is still being used.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-0:1.5.0.5-0.el4.1.src", "4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-0:1.5.0.5-0.el4.1.src", "4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-0:1.5.0.5-0.el4.1.src", "4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3805" }, { "category": "external", "summary": "RHBZ#1618165", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618165" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3805", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3805" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3805", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3805" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-29T00:16:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-0:1.5.0.5-0.el4.1.src", "4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-0:1.5.0.5-0.el4.1.src", "4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-0:1.5.0.5-0.el4.1.src", "4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0611" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-3806", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618166" } ], "notes": [ { "category": "description", "text": "Multiple integer overflows in the Javascript engine in Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 might allow remote attackers to execute arbitrary code via vectors involving (1) long strings in the toSource method of the Object, Array, and String objects; and (2) unspecified \"string function arguments.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-0:1.5.0.5-0.el4.1.src", "4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-0:1.5.0.5-0.el4.1.src", "4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-0:1.5.0.5-0.el4.1.src", "4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3806" }, { "category": "external", "summary": "RHBZ#1618166", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618166" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3806", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3806" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3806", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3806" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-29T00:16:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-0:1.5.0.5-0.el4.1.src", "4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-0:1.5.0.5-0.el4.1.src", "4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-0:1.5.0.5-0.el4.1.src", "4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0611" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-3807", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618167" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to execute arbitrary code via script that changes the standard Object() constructor to return a reference to a privileged object and calling \"named JavaScript functions\" that use the constructor.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-0:1.5.0.5-0.el4.1.src", "4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-0:1.5.0.5-0.el4.1.src", "4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-0:1.5.0.5-0.el4.1.src", "4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3807" }, { "category": "external", "summary": "RHBZ#1618167", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618167" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3807", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3807" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3807", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3807" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-29T00:16:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-0:1.5.0.5-0.el4.1.src", "4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-0:1.5.0.5-0.el4.1.src", "4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-0:1.5.0.5-0.el4.1.src", "4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0611" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-3808", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618168" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox before 1.5.0.5 and SeaMonkey before 1.0.3 allows remote Proxy AutoConfig (PAC) servers to execute code with elevated privileges via a PAC script that sets the FindProxyForURL function to an eval method on a privileged object.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-0:1.5.0.5-0.el4.1.src", "4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-0:1.5.0.5-0.el4.1.src", "4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-0:1.5.0.5-0.el4.1.src", "4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3808" }, { "category": "external", "summary": "RHBZ#1618168", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618168" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3808", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3808" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3808", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3808" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-29T00:16:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-0:1.5.0.5-0.el4.1.src", "4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-0:1.5.0.5-0.el4.1.src", "4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-0:1.5.0.5-0.el4.1.src", "4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0611" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2006-3809", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618169" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows scripts with the UniversalBrowserRead privilege to gain UniversalXPConnect privileges and possibly execute code or obtain sensitive data by reading into a privileged context.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-0:1.5.0.5-0.el4.1.src", "4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-0:1.5.0.5-0.el4.1.src", "4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-0:1.5.0.5-0.el4.1.src", "4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3809" }, { "category": "external", "summary": "RHBZ#1618169", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618169" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3809", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3809" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3809", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3809" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-29T00:16:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-0:1.5.0.5-0.el4.1.src", "4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-0:1.5.0.5-0.el4.1.src", "4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-0:1.5.0.5-0.el4.1.src", "4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0611" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-3810", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618170" } ], "notes": [ { "category": "description", "text": "Cross-site scripting (XSS) vulnerability in Mozilla Firefox 1.5 before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to inject arbitrary web script or HTML via the XPCNativeWrapper(window).Function construct.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-0:1.5.0.5-0.el4.1.src", "4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-0:1.5.0.5-0.el4.1.src", "4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-0:1.5.0.5-0.el4.1.src", "4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3810" }, { "category": "external", "summary": "RHBZ#1618170", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618170" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3810", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3810" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3810", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3810" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-29T00:16:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-0:1.5.0.5-0.el4.1.src", "4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-0:1.5.0.5-0.el4.1.src", "4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-0:1.5.0.5-0.el4.1.src", "4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0611" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2006-3811", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618171" } ], "notes": [ { "category": "description", "text": "Multiple vulnerabilities in Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via Javascript that leads to memory corruption, including (1) nsListControlFrame::FireMenuItemActiveEvent, (2) buffer overflows in the string class in out-of-memory conditions, (3) table row and column groups, (4) \"anonymous box selectors outside of UA stylesheets,\" (5) stale references to \"removed nodes,\" and (6) running the crypto.generateCRMFRequest callback on deleted context.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-0:1.5.0.5-0.el4.1.src", "4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-0:1.5.0.5-0.el4.1.src", "4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-0:1.5.0.5-0.el4.1.src", "4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3811" }, { "category": "external", "summary": "RHBZ#1618171", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618171" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3811", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3811" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3811", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3811" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-29T00:16:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-0:1.5.0.5-0.el4.1.src", "4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-0:1.5.0.5-0.el4.1.src", "4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-0:1.5.0.5-0.el4.1.src", "4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0611" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" } ] }
rhsa-2006_0594
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated seamonkey packages that fix several security bugs in the mozilla\npackages are now available for Red Hat Enterprise Linux 2.1.\n\nThis update has been rated as having critical security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "SeaMonkey is an open source Web browser, advanced email and newsgroup\nclient, IRC chat client, and HTML editor.\n\nThe Mozilla Foundation has discontinued support for the Mozilla Suite. This\nupdate deprecates the Mozilla Suite in Red Hat Enterprise Linux 2.1 in\nfavor of the supported SeaMonkey Suite.\n\nThis update also resolves a number of outstanding Mozilla security issues:\n\nSeveral flaws were found in the way SeaMonkey processed certain javascript\nactions. A malicious web page could execute arbitrary javascript\ninstructions with the permissions of \"chrome\", allowing the page to steal\nsensitive information or install browser malware. (CVE-2006-2776,\nCVE-2006-2784, CVE-2006-2785, CVE-2006-2787, CVE-2006-3807, CVE-2006-3809,\nCVE-2006-3812)\n\nSeveral denial of service flaws were found in the way SeaMonkey processed\ncertain web content. A malicious web page could crash the browser or\npossibly execute arbitrary code as the user running SeaMonkey.\n(CVE-2006-2779, CVE-2006-2780, CVE-2006-3801, CVE-2006-3677, CVE-2006-3113,\nCVE-2006-3803, CVE-2006-3805, CVE-2006-3806, CVE-2006-3811)\n\nTwo flaws were found in the way SeaMonkey Messenger displayed malformed\ninline vcard attachments. If a victim viewed an email message containing\na carefully crafted vcard it was possible to execute arbitrary code as the\nuser running SeaMonkey Messenger. (CVE-2006-2781, CVE-2006-3804)\n\nA cross-site scripting flaw was found in the way SeaMonkey processed\nUnicode Byte-Order-Mark (BOM) markers in UTF-8 web pages. A malicious web\npage could execute a script within the browser that a web input sanitizer\ncould miss due to a malformed \"script\" tag. (CVE-2006-2783)\n\nSeveral flaws were found in the way SeaMonkey processed certain javascript\nactions. A malicious web page could conduct a cross-site scripting attack\nor steal sensitive information (such as cookies owned by other domains).\n(CVE-2006-3802, CVE-2006-3810)\n\nA form file upload flaw was found in the way SeaMonkey handled javascript\ninput object mutation. A malicious web page could upload an arbitrary local\nfile at form submission time without user interaction. (CVE-2006-2782)\n\nA denial of service flaw was found in the way SeaMonkey called the\ncrypto.signText() javascript function. A malicious web page could crash the\nbrowser if the victim had a client certificate loaded. (CVE-2006-2778)\n\nTwo HTTP response smuggling flaws were found in the way SeaMonkey processed\ncertain invalid HTTP response headers. A malicious web site could return\nspecially crafted HTTP response headers which may bypass HTTP proxy\nrestrictions. (CVE-2006-2786)\n\nA flaw was found in the way SeaMonkey processed Proxy AutoConfig scripts. A\nmalicious Proxy AutoConfig server could execute arbitrary javascript\ninstructions with the permissions of \"chrome\", allowing the page to steal\nsensitive information or install browser malware. (CVE-2006-3808)\n\nA double free flaw was found in the way the nsIX509::getRawDER method was\ncalled. If a victim visited a carefully crafted web page it was possible to\nexecute arbitrary code as the user running SeaMonkey. (CVE-2006-2788)\n\nUsers of Mozilla are advised to upgrade to this update, which contains\nSeaMonkey version 1.0.3 that corrects these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2006:0594", "url": "https://access.redhat.com/errata/RHSA-2006:0594" }, { "category": "external", "summary": "http://www.redhat.com/security/updates/classification/#critical", "url": "http://www.redhat.com/security/updates/classification/#critical" }, { "category": "external", "summary": "198686", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=198686" }, { "category": "external", "summary": "198687", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=198687" }, { "category": "external", "summary": "200167", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=200167" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2006/rhsa-2006_0594.json" } ], "title": "Red Hat Security Advisory: seamonkey security update (was mozilla)", "tracking": { "current_release_date": "2024-11-22T00:27:05+00:00", "generator": { "date": "2024-11-22T00:27:05+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2006:0594", "initial_release_date": "2006-08-28T11:30:00+00:00", "revision_history": [ { "date": "2006-08-28T11:30:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2006-09-15T09:27:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T00:27:05+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product": { "name": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::as" } } }, { "category": "product_name", "name": "Red Hat Linux Advanced Workstation 2.1", "product": { "name": "Red Hat Linux Advanced Workstation 2.1", "product_id": "Red Hat Linux Advanced Workstation 2.1", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::aw" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 2.1", "product": { "name": "Red Hat Enterprise Linux ES version 2.1", "product_id": "Red Hat Enterprise Linux ES version 2.1", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 2.1", "product": { "name": "Red Hat Enterprise Linux WS version 2.1", "product_id": "Red Hat Enterprise Linux WS version 2.1", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::ws" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2006-2776", "discovery_date": "2006-05-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618112" } ], "notes": [ { "category": "description", "text": "Certain privileged UI code in Mozilla Firefox and Thunderbird before 1.5.0.4 calls content-defined setters on an object prototype, which allows remote attackers to execute code at a higher privilege than intended.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2776" }, { "category": "external", "summary": "RHBZ#1618112", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618112" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2776", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2776" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2776", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2776" } ], "release_date": "2006-06-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-08-28T11:30:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0594" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2006-2778", "discovery_date": "2006-05-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618113" } ], "notes": [ { "category": "description", "text": "The crypto.signText function in Mozilla Firefox and Thunderbird before 1.5.0.4 allows remote attackers to execute arbitrary code via certain optional Certificate Authority name arguments, which causes an invalid array index and triggers a buffer overflow.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2778" }, { "category": "external", "summary": "RHBZ#1618113", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618113" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2778", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2778" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2778", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2778" } ], "release_date": "2006-06-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-08-28T11:30:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0594" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2006-2779", "discovery_date": "2006-06-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618114" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox and Thunderbird before 1.5.0.4 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via (1) nested \u003coption\u003e tags in a select tag, (2) a DOMNodeRemoved mutation event, (3) \"Content-implemented tree views,\" (4) BoxObjects, (5) the XBL implementation, (6) an iframe that attempts to remove itself, which leads to memory corruption.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2779" }, { "category": "external", "summary": "RHBZ#1618114", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618114" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2779", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2779" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2779", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2779" } ], "release_date": "2006-06-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-08-28T11:30:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0594" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-2780", "discovery_date": "2006-06-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618115" } ], "notes": [ { "category": "description", "text": "Integer overflow in Mozilla Firefox and Thunderbird before 1.5.0.4 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via \"jsstr tagify,\" which leads to memory corruption.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2780" }, { "category": "external", "summary": "RHBZ#1618115", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618115" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2780", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2780" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2780", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2780" } ], "release_date": "2006-06-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-08-28T11:30:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0594" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-2781", "discovery_date": "2006-06-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "193963" } ], "notes": [ { "category": "description", "text": "Double free vulnerability in nsVCard.cpp in Mozilla Thunderbird before 1.5.0.4 and SeaMonkey before 1.0.2 allows remote attackers to cause a denial of service (hang) and possibly execute arbitrary code via a VCard that contains invalid base64 characters.", "title": "Vulnerability description" }, { "category": "summary", "text": "(seamonkey): DOS/arbitrary code execution vuln with vcards", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2781" }, { "category": "external", "summary": "RHBZ#193963", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=193963" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2781", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2781" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2781", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2781" } ], "release_date": "2006-06-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-08-28T11:30:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0594" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "(seamonkey): DOS/arbitrary code execution vuln with vcards" }, { "cve": "CVE-2006-2782", "discovery_date": "2006-05-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618116" } ], "notes": [ { "category": "description", "text": "Firefox 1.5.0.2 does not fix all test cases associated with CVE-2006-1729, which allows remote attackers to read arbitrary files by inserting the target filename into a text box, then turning that box into a file upload control.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2782" }, { "category": "external", "summary": "RHBZ#1618116", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618116" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2782", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2782" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2782", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2782" } ], "release_date": "2006-06-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-08-28T11:30:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0594" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2006-2783", "discovery_date": "2006-05-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618117" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox and Thunderbird before 1.5.0.4 strip the Unicode Byte-order-Mark (BOM) from a UTF-8 page before the page is passed to the parser, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a BOM sequence in the middle of a dangerous tag such as SCRIPT.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2783" }, { "category": "external", "summary": "RHBZ#1618117", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618117" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2783", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2783" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2783", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2783" } ], "release_date": "2006-06-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-08-28T11:30:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0594" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2006-2784", "discovery_date": "2006-05-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618118" } ], "notes": [ { "category": "description", "text": "The PLUGINSPAGE functionality in Mozilla Firefox before 1.5.0.4 allows remote user-assisted attackers to execute privileged code by tricking a user into installing missing plugins and selecting the \"Manual Install\" button, then using nested javascript: URLs. NOTE: the manual install button is used for downloading software from a remote web site, so this issue would not cross privilege boundaries if the user progresses to the point of installing malicious software from the attacker-controlled site.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2784" }, { "category": "external", "summary": "RHBZ#1618118", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618118" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2784", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2784" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2784", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2784" } ], "release_date": "2006-06-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-08-28T11:30:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0594" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2006-2785", "discovery_date": "2006-05-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618119" } ], "notes": [ { "category": "description", "text": "Cross-site scripting (XSS) vulnerability in Mozilla Firefox before 1.5.0.4 allows user-assisted remote attackers to inject arbitrary web script or HTML by tricking a user into (1) performing a \"View Image\" on a broken image in which the SRC attribute contains a Javascript URL, or (2) selecting \"Show only this frame\" on a frame whose SRC attribute contains a Javascript URL.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2785" }, { "category": "external", "summary": "RHBZ#1618119", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618119" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2785", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2785" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2785", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2785" } ], "release_date": "2006-06-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-08-28T11:30:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0594" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2006-2786", "discovery_date": "2006-05-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618120" } ], "notes": [ { "category": "description", "text": "HTTP response smuggling vulnerability in Mozilla Firefox and Thunderbird before 1.5.0.4, when used with certain proxy servers, allows remote attackers to cause Firefox to interpret certain responses as if they were responses from two different sites via (1) invalid HTTP response headers with spaces between the header name and the colon, which might not be ignored in some cases, or (2) HTTP 1.1 headers through an HTTP 1.0 proxy, which are ignored by the proxy but processed by the client.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2786" }, { "category": "external", "summary": "RHBZ#1618120", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618120" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2786", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2786" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2786", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2786" } ], "release_date": "2006-06-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-08-28T11:30:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0594" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2006-2787", "discovery_date": "2006-05-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618121" } ], "notes": [ { "category": "description", "text": "EvalInSandbox in Mozilla Firefox and Thunderbird before 1.5.0.4 allows remote attackers to gain privileges via javascript that calls the valueOf method on objects that were created outside of the sandbox.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2787" }, { "category": "external", "summary": "RHBZ#1618121", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618121" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2787", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2787" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2787", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2787" } ], "release_date": "2006-06-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-08-28T11:30:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0594" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2006-2788", "discovery_date": "2006-05-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618122" } ], "notes": [ { "category": "description", "text": "Double free vulnerability in the getRawDER function for nsIX509Cert in Firefox allows remote attackers to cause a denial of service (hang) and possibly execute arbitrary code via certain Javascript code.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2788" }, { "category": "external", "summary": "RHBZ#1618122", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618122" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2788", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2788" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2788", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2788" } ], "release_date": "2006-06-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-08-28T11:30:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0594" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2006-3113", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618135" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox 1.5 before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via simultaneous XPCOM events, which causes a timer object to be deleted in a way that triggers memory corruption.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3113" }, { "category": "external", "summary": "RHBZ#1618135", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618135" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3113", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3113" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3113", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3113" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-08-28T11:30:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0594" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-3677", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618153" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox 1.5 before 1.5.0.5 and SeaMonkey before 1.0.3 allows remote attackers to execute arbitrary code by changing certain properties of the window navigator object (window.navigator) that are accessed when Java starts up, which causes a crash that leads to code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3677" }, { "category": "external", "summary": "RHBZ#1618153", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618153" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3677", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3677" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3677", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3677" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-08-28T11:30:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0594" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-3801", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618161" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox 1.5 before 1.5.0.5 and SeaMonkey before 1.0.3 does not properly clear a JavaScript reference to a frame or window, which leaves a pointer to a deleted object that allows remote attackers to execute arbitrary native code.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3801" }, { "category": "external", "summary": "RHBZ#1618161", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618161" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3801", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3801" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3801", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3801" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-08-28T11:30:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0594" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-3802", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618162" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to hijack native DOM methods from objects in another domain and conduct cross-site scripting (XSS) attacks using DOM methods of the top-level object.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3802" }, { "category": "external", "summary": "RHBZ#1618162", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618162" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3802", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3802" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3802", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3802" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-08-28T11:30:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0594" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2006-3803", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618163" } ], "notes": [ { "category": "description", "text": "Race condition in the JavaScript garbage collection in Mozilla Firefox 1.5 before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 might allow remote attackers to execute arbitrary code by causing the garbage collector to delete a temporary variable while it is still being used during the creation of a new Function object.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3803" }, { "category": "external", "summary": "RHBZ#1618163", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618163" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3803", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3803" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3803", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3803" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-08-28T11:30:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0594" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-3804", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618164" } ], "notes": [ { "category": "description", "text": "Heap-based buffer overflow in Mozilla Thunderbird before 1.5.0.5 and SeaMonkey before 1.0.3 allows remote attackers to cause a denial of service (crash) via a VCard attachment with a malformed base64 field, which copies more data than expected due to an integer underflow.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3804" }, { "category": "external", "summary": "RHBZ#1618164", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618164" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3804", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3804" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3804", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3804" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-08-28T11:30:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0594" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-3805", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618165" } ], "notes": [ { "category": "description", "text": "The Javascript engine in Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 might allow remote attackers to execute arbitrary code via vectors involving garbage collection that causes deletion of a temporary object that is still being used.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3805" }, { "category": "external", "summary": "RHBZ#1618165", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618165" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3805", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3805" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3805", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3805" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-08-28T11:30:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0594" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-3806", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618166" } ], "notes": [ { "category": "description", "text": "Multiple integer overflows in the Javascript engine in Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 might allow remote attackers to execute arbitrary code via vectors involving (1) long strings in the toSource method of the Object, Array, and String objects; and (2) unspecified \"string function arguments.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3806" }, { "category": "external", "summary": "RHBZ#1618166", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618166" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3806", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3806" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3806", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3806" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-08-28T11:30:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0594" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-3807", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618167" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to execute arbitrary code via script that changes the standard Object() constructor to return a reference to a privileged object and calling \"named JavaScript functions\" that use the constructor.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3807" }, { "category": "external", "summary": "RHBZ#1618167", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618167" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3807", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3807" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3807", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3807" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-08-28T11:30:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0594" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-3808", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618168" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox before 1.5.0.5 and SeaMonkey before 1.0.3 allows remote Proxy AutoConfig (PAC) servers to execute code with elevated privileges via a PAC script that sets the FindProxyForURL function to an eval method on a privileged object.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3808" }, { "category": "external", "summary": "RHBZ#1618168", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618168" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3808", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3808" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3808", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3808" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-08-28T11:30:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0594" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2006-3809", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618169" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows scripts with the UniversalBrowserRead privilege to gain UniversalXPConnect privileges and possibly execute code or obtain sensitive data by reading into a privileged context.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3809" }, { "category": "external", "summary": "RHBZ#1618169", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618169" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3809", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3809" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3809", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3809" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-08-28T11:30:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0594" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-3810", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618170" } ], "notes": [ { "category": "description", "text": "Cross-site scripting (XSS) vulnerability in Mozilla Firefox 1.5 before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to inject arbitrary web script or HTML via the XPCNativeWrapper(window).Function construct.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3810" }, { "category": "external", "summary": "RHBZ#1618170", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618170" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3810", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3810" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3810", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3810" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-08-28T11:30:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0594" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2006-3811", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618171" } ], "notes": [ { "category": "description", "text": "Multiple vulnerabilities in Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via Javascript that leads to memory corruption, including (1) nsListControlFrame::FireMenuItemActiveEvent, (2) buffer overflows in the string class in out-of-memory conditions, (3) table row and column groups, (4) \"anonymous box selectors outside of UA stylesheets,\" (5) stale references to \"removed nodes,\" and (6) running the crypto.generateCRMFRequest callback on deleted context.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3811" }, { "category": "external", "summary": "RHBZ#1618171", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618171" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3811", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3811" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3811", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3811" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-08-28T11:30:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0594" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-3812", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "200455" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to reference remote files and possibly load chrome: URLs by tricking the user into copying or dragging links.", "title": "Vulnerability description" }, { "category": "summary", "text": "vulnerabilities: CVE-2006-{3113,3677,3801-3812}", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3812" }, { "category": "external", "summary": "RHBZ#200455", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=200455" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3812", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3812" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3812", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3812" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-08-28T11:30:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0594" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "vulnerabilities: CVE-2006-{3113,3677,3801-3812}" } ] }
RHSA-2006:0608
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated seamonkey packages that fix several security bugs are now available\nfor Red Hat Enterprise Linux 3.\n\nThis update has been rated as having critical security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "SeaMonkey is an open source Web browser, advanced email and newsgroup\nclient, IRC chat client, and HTML editor.\n\nSeveral flaws were found in the way SeaMonkey processed certain javascript\nactions. A malicious web page could execute arbitrary javascript\ninstructions with the permissions of \"chrome\", allowing the page to steal\nsensitive information or install browser malware. (CVE-2006-3807,\nCVE-2006-3809, CVE-2006-3812)\n\nSeveral denial of service flaws were found in the way SeaMonkey processed\ncertain web content. A malicious web page could crash the browser or\npossibly execute arbitrary code as the user running SeaMonkey.\n(CVE-2006-3801, CVE-2006-3677, CVE-2006-3113, CVE-2006-3803, CVE-2006-3805,\nCVE-2006-3806, CVE-2006-3811)\n\nA buffer overflow flaw was found in the way SeaMonkey Messenger displayed\nmalformed inline vcard attachments. If a victim viewed an email message\ncontaining a carefully crafted vcard, it was possible to execute arbitrary\ncode as the user running SeaMonkey Messenger. (CVE-2006-3804)\n\nSeveral flaws were found in the way SeaMonkey processed certain javascript\nactions. A malicious web page could conduct a cross-site scripting attack\nor steal sensitive information (such as cookies owned by other domains).\n(CVE-2006-3802, CVE-2006-3810)\n\nA flaw was found in the way SeaMonkey processed Proxy AutoConfig scripts. A\nmalicious Proxy AutoConfig server could execute arbitrary javascript\ninstructions with the permissions of \"chrome\", allowing the page to steal\nsensitive information or install browser malware. (CVE-2006-3808)\n\nUsers of SeaMonkey are advised to upgrade to this update, which contains\nSeaMonkey version 1.0.3 that corrects these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2006:0608", "url": "https://access.redhat.com/errata/RHSA-2006:0608" }, { "category": "external", "summary": "http://www.redhat.com/security/updates/classification/#critical", "url": "http://www.redhat.com/security/updates/classification/#critical" }, { "category": "external", "summary": "200253", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=200253" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2006/rhsa-2006_0608.json" } ], "title": "Red Hat Security Advisory: seamonkey security update", "tracking": { "current_release_date": "2025-09-10T13:38:44+00:00", "generator": { "date": "2025-09-10T13:38:44+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.7" } }, "id": "RHSA-2006:0608", "initial_release_date": "2006-07-27T19:53:00+00:00", "revision_history": [ { "date": "2006-07-27T19:53:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2006-07-27T00:00:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-09-10T13:38:44+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 3", "product": { "name": "Red Hat Enterprise Linux AS version 3", "product_id": "3AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::as" } } }, { "category": "product_name", "name": "Red Hat Desktop version 3", "product": { "name": "Red Hat Desktop version 3", "product_id": "3Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 3", "product": { "name": "Red Hat Enterprise Linux ES version 3", "product_id": "3ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 3", "product": { "name": "Red Hat Enterprise Linux WS version 3", "product_id": "3WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::ws" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "product": { "name": "seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "product_id": "seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nspr@1.0.3-0.el3.1?arch=ia64" } } }, { "category": "product_version", "name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "product": { "name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "product_id": "seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nss-devel@1.0.3-0.el3.1?arch=ia64" } } }, { "category": "product_version", "name": "seamonkey-devel-0:1.0.3-0.el3.1.ia64", "product": { "name": "seamonkey-devel-0:1.0.3-0.el3.1.ia64", "product_id": "seamonkey-devel-0:1.0.3-0.el3.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-devel@1.0.3-0.el3.1?arch=ia64" } } }, { "category": "product_version", "name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "product": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "product_id": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-dom-inspector@1.0.3-0.el3.1?arch=ia64" } } }, { "category": "product_version", "name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "product": { "name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "product_id": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nspr-devel@1.0.3-0.el3.1?arch=ia64" } } }, { "category": "product_version", "name": "seamonkey-0:1.0.3-0.el3.1.ia64", "product": { "name": "seamonkey-0:1.0.3-0.el3.1.ia64", "product_id": "seamonkey-0:1.0.3-0.el3.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey@1.0.3-0.el3.1?arch=ia64" } } }, { "category": "product_version", "name": "seamonkey-chat-0:1.0.3-0.el3.1.ia64", "product": { "name": "seamonkey-chat-0:1.0.3-0.el3.1.ia64", "product_id": "seamonkey-chat-0:1.0.3-0.el3.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-chat@1.0.3-0.el3.1?arch=ia64" } } }, { "category": "product_version", "name": "seamonkey-nss-0:1.0.3-0.el3.1.ia64", "product": { "name": "seamonkey-nss-0:1.0.3-0.el3.1.ia64", "product_id": "seamonkey-nss-0:1.0.3-0.el3.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nss@1.0.3-0.el3.1?arch=ia64" } } }, { "category": "product_version", "name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "product": { "name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "product_id": "seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-debuginfo@1.0.3-0.el3.1?arch=ia64" } } }, { "category": "product_version", "name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "product": { "name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "product_id": "seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-js-debugger@1.0.3-0.el3.1?arch=ia64" } } }, { "category": "product_version", "name": "seamonkey-mail-0:1.0.3-0.el3.1.ia64", "product": { "name": "seamonkey-mail-0:1.0.3-0.el3.1.ia64", "product_id": "seamonkey-mail-0:1.0.3-0.el3.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-mail@1.0.3-0.el3.1?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "seamonkey-nspr-0:1.0.3-0.el3.1.i386", "product": { "name": "seamonkey-nspr-0:1.0.3-0.el3.1.i386", "product_id": "seamonkey-nspr-0:1.0.3-0.el3.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nspr@1.0.3-0.el3.1?arch=i386" } } }, { "category": "product_version", "name": "seamonkey-nss-0:1.0.3-0.el3.1.i386", "product": { "name": "seamonkey-nss-0:1.0.3-0.el3.1.i386", "product_id": "seamonkey-nss-0:1.0.3-0.el3.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nss@1.0.3-0.el3.1?arch=i386" } } }, { "category": "product_version", "name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "product": { "name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "product_id": "seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-debuginfo@1.0.3-0.el3.1?arch=i386" } } }, { "category": "product_version", "name": "seamonkey-0:1.0.3-0.el3.1.i386", "product": { "name": "seamonkey-0:1.0.3-0.el3.1.i386", "product_id": "seamonkey-0:1.0.3-0.el3.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey@1.0.3-0.el3.1?arch=i386" } } }, { "category": "product_version", "name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "product": { "name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "product_id": "seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nss-devel@1.0.3-0.el3.1?arch=i386" } } }, { "category": "product_version", "name": "seamonkey-devel-0:1.0.3-0.el3.1.i386", "product": { "name": "seamonkey-devel-0:1.0.3-0.el3.1.i386", "product_id": "seamonkey-devel-0:1.0.3-0.el3.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-devel@1.0.3-0.el3.1?arch=i386" } } }, { "category": "product_version", "name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "product": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "product_id": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-dom-inspector@1.0.3-0.el3.1?arch=i386" } } }, { "category": "product_version", "name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "product": { "name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "product_id": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nspr-devel@1.0.3-0.el3.1?arch=i386" } } }, { "category": "product_version", "name": "seamonkey-chat-0:1.0.3-0.el3.1.i386", "product": { "name": "seamonkey-chat-0:1.0.3-0.el3.1.i386", "product_id": "seamonkey-chat-0:1.0.3-0.el3.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-chat@1.0.3-0.el3.1?arch=i386" } } }, { "category": "product_version", "name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "product": { "name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "product_id": "seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-js-debugger@1.0.3-0.el3.1?arch=i386" } } }, { "category": "product_version", "name": "seamonkey-mail-0:1.0.3-0.el3.1.i386", "product": { "name": "seamonkey-mail-0:1.0.3-0.el3.1.i386", "product_id": "seamonkey-mail-0:1.0.3-0.el3.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-mail@1.0.3-0.el3.1?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "product": { "name": "seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "product_id": "seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nspr@1.0.3-0.el3.1?arch=x86_64" } } }, { "category": "product_version", "name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "product": { "name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "product_id": "seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nss-devel@1.0.3-0.el3.1?arch=x86_64" } } }, { "category": "product_version", "name": "seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "product": { "name": "seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "product_id": "seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-devel@1.0.3-0.el3.1?arch=x86_64" } } }, { "category": "product_version", "name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "product": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "product_id": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-dom-inspector@1.0.3-0.el3.1?arch=x86_64" } } }, { "category": "product_version", "name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "product": { "name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "product_id": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nspr-devel@1.0.3-0.el3.1?arch=x86_64" } } }, { "category": "product_version", "name": "seamonkey-0:1.0.3-0.el3.1.x86_64", "product": { "name": "seamonkey-0:1.0.3-0.el3.1.x86_64", "product_id": "seamonkey-0:1.0.3-0.el3.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey@1.0.3-0.el3.1?arch=x86_64" } } }, { "category": "product_version", "name": "seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "product": { "name": "seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "product_id": "seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-chat@1.0.3-0.el3.1?arch=x86_64" } } }, { "category": "product_version", "name": "seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "product": { "name": "seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "product_id": "seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nss@1.0.3-0.el3.1?arch=x86_64" } } }, { "category": "product_version", "name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "product": { "name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "product_id": "seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-debuginfo@1.0.3-0.el3.1?arch=x86_64" } } }, { "category": "product_version", "name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "product": { "name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "product_id": "seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-js-debugger@1.0.3-0.el3.1?arch=x86_64" } } }, { "category": "product_version", "name": "seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "product": { "name": "seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "product_id": "seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-mail@1.0.3-0.el3.1?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "seamonkey-0:1.0.3-0.el3.1.src", "product": { "name": "seamonkey-0:1.0.3-0.el3.1.src", "product_id": "seamonkey-0:1.0.3-0.el3.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey@1.0.3-0.el3.1?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "product": { "name": "seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "product_id": "seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nspr@1.0.3-0.el3.1?arch=ppc" } } }, { "category": "product_version", "name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "product": { "name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "product_id": "seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nss-devel@1.0.3-0.el3.1?arch=ppc" } } }, { "category": "product_version", "name": "seamonkey-devel-0:1.0.3-0.el3.1.ppc", "product": { "name": "seamonkey-devel-0:1.0.3-0.el3.1.ppc", "product_id": "seamonkey-devel-0:1.0.3-0.el3.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-devel@1.0.3-0.el3.1?arch=ppc" } } }, { "category": "product_version", "name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "product": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "product_id": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-dom-inspector@1.0.3-0.el3.1?arch=ppc" } } }, { "category": "product_version", "name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "product": { "name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "product_id": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nspr-devel@1.0.3-0.el3.1?arch=ppc" } } }, { "category": "product_version", "name": "seamonkey-0:1.0.3-0.el3.1.ppc", "product": { "name": "seamonkey-0:1.0.3-0.el3.1.ppc", "product_id": "seamonkey-0:1.0.3-0.el3.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey@1.0.3-0.el3.1?arch=ppc" } } }, { "category": "product_version", "name": "seamonkey-chat-0:1.0.3-0.el3.1.ppc", "product": { "name": "seamonkey-chat-0:1.0.3-0.el3.1.ppc", "product_id": "seamonkey-chat-0:1.0.3-0.el3.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-chat@1.0.3-0.el3.1?arch=ppc" } } }, { "category": "product_version", "name": "seamonkey-nss-0:1.0.3-0.el3.1.ppc", "product": { "name": "seamonkey-nss-0:1.0.3-0.el3.1.ppc", "product_id": "seamonkey-nss-0:1.0.3-0.el3.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nss@1.0.3-0.el3.1?arch=ppc" } } }, { "category": "product_version", "name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "product": { "name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "product_id": "seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-debuginfo@1.0.3-0.el3.1?arch=ppc" } } }, { "category": "product_version", "name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "product": { "name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "product_id": "seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-js-debugger@1.0.3-0.el3.1?arch=ppc" } } }, { "category": "product_version", "name": "seamonkey-mail-0:1.0.3-0.el3.1.ppc", "product": { "name": "seamonkey-mail-0:1.0.3-0.el3.1.ppc", "product_id": "seamonkey-mail-0:1.0.3-0.el3.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-mail@1.0.3-0.el3.1?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "product": { "name": "seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "product_id": "seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nspr@1.0.3-0.el3.1?arch=s390x" } } }, { "category": "product_version", "name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "product": { "name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "product_id": "seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nss-devel@1.0.3-0.el3.1?arch=s390x" } } }, { "category": "product_version", "name": "seamonkey-devel-0:1.0.3-0.el3.1.s390x", "product": { "name": "seamonkey-devel-0:1.0.3-0.el3.1.s390x", "product_id": "seamonkey-devel-0:1.0.3-0.el3.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-devel@1.0.3-0.el3.1?arch=s390x" } } }, { "category": "product_version", "name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "product": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "product_id": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-dom-inspector@1.0.3-0.el3.1?arch=s390x" } } }, { "category": "product_version", "name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "product": { "name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "product_id": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nspr-devel@1.0.3-0.el3.1?arch=s390x" } } }, { "category": "product_version", "name": "seamonkey-0:1.0.3-0.el3.1.s390x", "product": { "name": "seamonkey-0:1.0.3-0.el3.1.s390x", "product_id": "seamonkey-0:1.0.3-0.el3.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey@1.0.3-0.el3.1?arch=s390x" } } }, { "category": "product_version", "name": "seamonkey-chat-0:1.0.3-0.el3.1.s390x", "product": { "name": "seamonkey-chat-0:1.0.3-0.el3.1.s390x", "product_id": "seamonkey-chat-0:1.0.3-0.el3.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-chat@1.0.3-0.el3.1?arch=s390x" } } }, { "category": "product_version", "name": "seamonkey-nss-0:1.0.3-0.el3.1.s390x", "product": { "name": "seamonkey-nss-0:1.0.3-0.el3.1.s390x", "product_id": "seamonkey-nss-0:1.0.3-0.el3.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nss@1.0.3-0.el3.1?arch=s390x" } } }, { "category": "product_version", "name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "product": { "name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "product_id": "seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-debuginfo@1.0.3-0.el3.1?arch=s390x" } } }, { "category": "product_version", "name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "product": { "name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "product_id": "seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-js-debugger@1.0.3-0.el3.1?arch=s390x" } } }, { "category": "product_version", "name": "seamonkey-mail-0:1.0.3-0.el3.1.s390x", "product": { "name": "seamonkey-mail-0:1.0.3-0.el3.1.s390x", "product_id": "seamonkey-mail-0:1.0.3-0.el3.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-mail@1.0.3-0.el3.1?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "seamonkey-nspr-0:1.0.3-0.el3.1.s390", "product": { "name": "seamonkey-nspr-0:1.0.3-0.el3.1.s390", "product_id": "seamonkey-nspr-0:1.0.3-0.el3.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nspr@1.0.3-0.el3.1?arch=s390" } } }, { "category": "product_version", "name": "seamonkey-nss-0:1.0.3-0.el3.1.s390", "product": { "name": "seamonkey-nss-0:1.0.3-0.el3.1.s390", "product_id": "seamonkey-nss-0:1.0.3-0.el3.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nss@1.0.3-0.el3.1?arch=s390" } } }, { "category": "product_version", "name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "product": { "name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "product_id": "seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-debuginfo@1.0.3-0.el3.1?arch=s390" } } }, { "category": "product_version", "name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "product": { "name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "product_id": "seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nss-devel@1.0.3-0.el3.1?arch=s390" } } }, { "category": "product_version", "name": "seamonkey-devel-0:1.0.3-0.el3.1.s390", "product": { "name": "seamonkey-devel-0:1.0.3-0.el3.1.s390", "product_id": "seamonkey-devel-0:1.0.3-0.el3.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-devel@1.0.3-0.el3.1?arch=s390" } } }, { "category": "product_version", "name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "product": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "product_id": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-dom-inspector@1.0.3-0.el3.1?arch=s390" } } }, { "category": "product_version", "name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "product": { "name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "product_id": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nspr-devel@1.0.3-0.el3.1?arch=s390" } } }, { "category": "product_version", "name": "seamonkey-0:1.0.3-0.el3.1.s390", "product": { "name": "seamonkey-0:1.0.3-0.el3.1.s390", "product_id": "seamonkey-0:1.0.3-0.el3.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey@1.0.3-0.el3.1?arch=s390" } } }, { "category": "product_version", "name": "seamonkey-chat-0:1.0.3-0.el3.1.s390", "product": { "name": "seamonkey-chat-0:1.0.3-0.el3.1.s390", "product_id": "seamonkey-chat-0:1.0.3-0.el3.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-chat@1.0.3-0.el3.1?arch=s390" } } }, { "category": "product_version", "name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "product": { "name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "product_id": "seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-js-debugger@1.0.3-0.el3.1?arch=s390" } } }, { "category": "product_version", "name": "seamonkey-mail-0:1.0.3-0.el3.1.s390", "product": { "name": "seamonkey-mail-0:1.0.3-0.el3.1.s390", "product_id": "seamonkey-mail-0:1.0.3-0.el3.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-mail@1.0.3-0.el3.1?arch=s390" } } } ], "category": "architecture", "name": "s390" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-0:1.0.3-0.el3.1.i386" }, "product_reference": "seamonkey-0:1.0.3-0.el3.1.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-0:1.0.3-0.el3.1.ia64" }, "product_reference": "seamonkey-0:1.0.3-0.el3.1.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-0:1.0.3-0.el3.1.ppc" }, "product_reference": "seamonkey-0:1.0.3-0.el3.1.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-0:1.0.3-0.el3.1.s390" }, "product_reference": "seamonkey-0:1.0.3-0.el3.1.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-0:1.0.3-0.el3.1.s390x" }, "product_reference": "seamonkey-0:1.0.3-0.el3.1.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el3.1.src as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-0:1.0.3-0.el3.1.src" }, "product_reference": "seamonkey-0:1.0.3-0.el3.1.src", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-0:1.0.3-0.el3.1.x86_64" }, "product_reference": "seamonkey-0:1.0.3-0.el3.1.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-chat-0:1.0.3-0.el3.1.i386" }, "product_reference": "seamonkey-chat-0:1.0.3-0.el3.1.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ia64" }, "product_reference": "seamonkey-chat-0:1.0.3-0.el3.1.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ppc" }, "product_reference": "seamonkey-chat-0:1.0.3-0.el3.1.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390" }, "product_reference": "seamonkey-chat-0:1.0.3-0.el3.1.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390x" }, "product_reference": "seamonkey-chat-0:1.0.3-0.el3.1.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64" }, "product_reference": "seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386" }, "product_reference": "seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64" }, "product_reference": "seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc" }, "product_reference": "seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390" }, "product_reference": "seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x" }, "product_reference": "seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64" }, "product_reference": "seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-devel-0:1.0.3-0.el3.1.i386" }, "product_reference": "seamonkey-devel-0:1.0.3-0.el3.1.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ia64" }, "product_reference": "seamonkey-devel-0:1.0.3-0.el3.1.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ppc" }, "product_reference": "seamonkey-devel-0:1.0.3-0.el3.1.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390" }, "product_reference": "seamonkey-devel-0:1.0.3-0.el3.1.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390x" }, "product_reference": "seamonkey-devel-0:1.0.3-0.el3.1.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64" }, "product_reference": "seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386" }, "product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64" }, "product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc" }, "product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390" }, "product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x" }, "product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64" }, "product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386" }, "product_reference": "seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64" }, "product_reference": "seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc" }, "product_reference": "seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390" }, "product_reference": "seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x" }, "product_reference": "seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64" }, "product_reference": "seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-mail-0:1.0.3-0.el3.1.i386" }, "product_reference": "seamonkey-mail-0:1.0.3-0.el3.1.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ia64" }, "product_reference": "seamonkey-mail-0:1.0.3-0.el3.1.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ppc" }, "product_reference": "seamonkey-mail-0:1.0.3-0.el3.1.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390" }, "product_reference": "seamonkey-mail-0:1.0.3-0.el3.1.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390x" }, "product_reference": "seamonkey-mail-0:1.0.3-0.el3.1.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64" }, "product_reference": "seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.i386" }, "product_reference": "seamonkey-nspr-0:1.0.3-0.el3.1.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64" }, "product_reference": "seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc" }, "product_reference": "seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390" }, "product_reference": "seamonkey-nspr-0:1.0.3-0.el3.1.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x" }, "product_reference": "seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64" }, "product_reference": "seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386" }, "product_reference": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64" }, "product_reference": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc" }, "product_reference": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390" }, "product_reference": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x" }, "product_reference": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64" }, "product_reference": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nss-0:1.0.3-0.el3.1.i386" }, "product_reference": "seamonkey-nss-0:1.0.3-0.el3.1.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ia64" }, "product_reference": "seamonkey-nss-0:1.0.3-0.el3.1.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ppc" }, "product_reference": "seamonkey-nss-0:1.0.3-0.el3.1.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390" }, "product_reference": "seamonkey-nss-0:1.0.3-0.el3.1.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390x" }, "product_reference": "seamonkey-nss-0:1.0.3-0.el3.1.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64" }, "product_reference": "seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386" }, "product_reference": "seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64" }, "product_reference": "seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc" }, "product_reference": "seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390" }, "product_reference": "seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x" }, "product_reference": "seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64" }, "product_reference": "seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el3.1.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-0:1.0.3-0.el3.1.i386" }, "product_reference": "seamonkey-0:1.0.3-0.el3.1.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-0:1.0.3-0.el3.1.ia64" }, "product_reference": "seamonkey-0:1.0.3-0.el3.1.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el3.1.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-0:1.0.3-0.el3.1.ppc" }, "product_reference": "seamonkey-0:1.0.3-0.el3.1.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el3.1.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390" }, "product_reference": "seamonkey-0:1.0.3-0.el3.1.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el3.1.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390x" }, "product_reference": "seamonkey-0:1.0.3-0.el3.1.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el3.1.src as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-0:1.0.3-0.el3.1.src" }, "product_reference": "seamonkey-0:1.0.3-0.el3.1.src", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-0:1.0.3-0.el3.1.x86_64" }, "product_reference": "seamonkey-0:1.0.3-0.el3.1.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.3-0.el3.1.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.i386" }, "product_reference": "seamonkey-chat-0:1.0.3-0.el3.1.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ia64" }, "product_reference": "seamonkey-chat-0:1.0.3-0.el3.1.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.3-0.el3.1.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ppc" }, "product_reference": "seamonkey-chat-0:1.0.3-0.el3.1.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.3-0.el3.1.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390" }, "product_reference": "seamonkey-chat-0:1.0.3-0.el3.1.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.3-0.el3.1.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390x" }, "product_reference": "seamonkey-chat-0:1.0.3-0.el3.1.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.x86_64" }, "product_reference": "seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386" }, "product_reference": "seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64" }, "product_reference": "seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc" }, "product_reference": "seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390" }, "product_reference": "seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x" }, "product_reference": "seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64" }, "product_reference": "seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.3-0.el3.1.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.i386" }, "product_reference": "seamonkey-devel-0:1.0.3-0.el3.1.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ia64" }, "product_reference": "seamonkey-devel-0:1.0.3-0.el3.1.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.3-0.el3.1.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ppc" }, "product_reference": "seamonkey-devel-0:1.0.3-0.el3.1.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.3-0.el3.1.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390" }, "product_reference": "seamonkey-devel-0:1.0.3-0.el3.1.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.3-0.el3.1.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390x" }, "product_reference": "seamonkey-devel-0:1.0.3-0.el3.1.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.x86_64" }, "product_reference": "seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386" }, "product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64" }, "product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc" }, "product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390" }, "product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x" }, "product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64" }, "product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386" }, "product_reference": "seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64" }, "product_reference": "seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc" }, "product_reference": "seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390" }, "product_reference": "seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x" }, "product_reference": "seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64" }, "product_reference": "seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.3-0.el3.1.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.i386" }, "product_reference": "seamonkey-mail-0:1.0.3-0.el3.1.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ia64" }, "product_reference": "seamonkey-mail-0:1.0.3-0.el3.1.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.3-0.el3.1.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ppc" }, "product_reference": "seamonkey-mail-0:1.0.3-0.el3.1.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.3-0.el3.1.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390" }, "product_reference": "seamonkey-mail-0:1.0.3-0.el3.1.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.3-0.el3.1.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390x" }, "product_reference": "seamonkey-mail-0:1.0.3-0.el3.1.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.x86_64" }, "product_reference": "seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.3-0.el3.1.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.i386" }, "product_reference": "seamonkey-nspr-0:1.0.3-0.el3.1.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ia64" }, "product_reference": "seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.3-0.el3.1.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ppc" }, "product_reference": "seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.3-0.el3.1.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390" }, "product_reference": "seamonkey-nspr-0:1.0.3-0.el3.1.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.3-0.el3.1.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390x" }, "product_reference": "seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64" }, "product_reference": "seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386" }, "product_reference": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64" }, "product_reference": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc" }, "product_reference": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390" }, "product_reference": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x" }, "product_reference": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64" }, "product_reference": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.3-0.el3.1.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.i386" }, "product_reference": "seamonkey-nss-0:1.0.3-0.el3.1.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ia64" }, "product_reference": "seamonkey-nss-0:1.0.3-0.el3.1.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.3-0.el3.1.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ppc" }, "product_reference": "seamonkey-nss-0:1.0.3-0.el3.1.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.3-0.el3.1.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390" }, "product_reference": "seamonkey-nss-0:1.0.3-0.el3.1.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.3-0.el3.1.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390x" }, "product_reference": "seamonkey-nss-0:1.0.3-0.el3.1.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.x86_64" }, "product_reference": "seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386" }, "product_reference": "seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64" }, "product_reference": "seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc" }, "product_reference": "seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390" }, "product_reference": "seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x" }, "product_reference": "seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64" }, "product_reference": "seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-0:1.0.3-0.el3.1.i386" }, "product_reference": "seamonkey-0:1.0.3-0.el3.1.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-0:1.0.3-0.el3.1.ia64" }, "product_reference": "seamonkey-0:1.0.3-0.el3.1.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-0:1.0.3-0.el3.1.ppc" }, "product_reference": "seamonkey-0:1.0.3-0.el3.1.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-0:1.0.3-0.el3.1.s390" }, "product_reference": "seamonkey-0:1.0.3-0.el3.1.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-0:1.0.3-0.el3.1.s390x" }, "product_reference": "seamonkey-0:1.0.3-0.el3.1.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el3.1.src as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-0:1.0.3-0.el3.1.src" }, "product_reference": "seamonkey-0:1.0.3-0.el3.1.src", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-0:1.0.3-0.el3.1.x86_64" }, "product_reference": "seamonkey-0:1.0.3-0.el3.1.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-chat-0:1.0.3-0.el3.1.i386" }, "product_reference": "seamonkey-chat-0:1.0.3-0.el3.1.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ia64" }, "product_reference": "seamonkey-chat-0:1.0.3-0.el3.1.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ppc" }, "product_reference": "seamonkey-chat-0:1.0.3-0.el3.1.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390" }, "product_reference": "seamonkey-chat-0:1.0.3-0.el3.1.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390x" }, "product_reference": "seamonkey-chat-0:1.0.3-0.el3.1.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-chat-0:1.0.3-0.el3.1.x86_64" }, "product_reference": "seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386" }, "product_reference": "seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64" }, "product_reference": "seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc" }, "product_reference": "seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390" }, "product_reference": "seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x" }, "product_reference": "seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64" }, "product_reference": "seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-devel-0:1.0.3-0.el3.1.i386" }, "product_reference": "seamonkey-devel-0:1.0.3-0.el3.1.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ia64" }, "product_reference": "seamonkey-devel-0:1.0.3-0.el3.1.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ppc" }, "product_reference": "seamonkey-devel-0:1.0.3-0.el3.1.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390" }, "product_reference": "seamonkey-devel-0:1.0.3-0.el3.1.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390x" }, "product_reference": "seamonkey-devel-0:1.0.3-0.el3.1.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-devel-0:1.0.3-0.el3.1.x86_64" }, "product_reference": "seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386" }, "product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64" }, "product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc" }, "product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390" }, "product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x" }, "product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64" }, "product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386" }, "product_reference": "seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64" }, "product_reference": "seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc" }, "product_reference": "seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390" }, "product_reference": "seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x" }, "product_reference": "seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64" }, "product_reference": "seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-mail-0:1.0.3-0.el3.1.i386" }, "product_reference": "seamonkey-mail-0:1.0.3-0.el3.1.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ia64" }, "product_reference": "seamonkey-mail-0:1.0.3-0.el3.1.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ppc" }, "product_reference": "seamonkey-mail-0:1.0.3-0.el3.1.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390" }, "product_reference": "seamonkey-mail-0:1.0.3-0.el3.1.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390x" }, "product_reference": "seamonkey-mail-0:1.0.3-0.el3.1.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-mail-0:1.0.3-0.el3.1.x86_64" }, "product_reference": "seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.i386" }, "product_reference": "seamonkey-nspr-0:1.0.3-0.el3.1.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ia64" }, "product_reference": "seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ppc" }, "product_reference": "seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390" }, "product_reference": "seamonkey-nspr-0:1.0.3-0.el3.1.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390x" }, "product_reference": "seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64" }, "product_reference": "seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386" }, "product_reference": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64" }, "product_reference": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc" }, "product_reference": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390" }, "product_reference": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x" }, "product_reference": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64" }, "product_reference": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nss-0:1.0.3-0.el3.1.i386" }, "product_reference": "seamonkey-nss-0:1.0.3-0.el3.1.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ia64" }, "product_reference": "seamonkey-nss-0:1.0.3-0.el3.1.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ppc" }, "product_reference": "seamonkey-nss-0:1.0.3-0.el3.1.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390" }, "product_reference": "seamonkey-nss-0:1.0.3-0.el3.1.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390x" }, "product_reference": "seamonkey-nss-0:1.0.3-0.el3.1.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nss-0:1.0.3-0.el3.1.x86_64" }, "product_reference": "seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386" }, "product_reference": "seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64" }, "product_reference": "seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc" }, "product_reference": "seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390" }, "product_reference": "seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x" }, "product_reference": "seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64" }, "product_reference": "seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-0:1.0.3-0.el3.1.i386" }, "product_reference": "seamonkey-0:1.0.3-0.el3.1.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-0:1.0.3-0.el3.1.ia64" }, "product_reference": "seamonkey-0:1.0.3-0.el3.1.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-0:1.0.3-0.el3.1.ppc" }, "product_reference": "seamonkey-0:1.0.3-0.el3.1.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-0:1.0.3-0.el3.1.s390" }, "product_reference": "seamonkey-0:1.0.3-0.el3.1.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-0:1.0.3-0.el3.1.s390x" }, "product_reference": "seamonkey-0:1.0.3-0.el3.1.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el3.1.src as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-0:1.0.3-0.el3.1.src" }, "product_reference": "seamonkey-0:1.0.3-0.el3.1.src", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-0:1.0.3-0.el3.1.x86_64" }, "product_reference": "seamonkey-0:1.0.3-0.el3.1.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-chat-0:1.0.3-0.el3.1.i386" }, "product_reference": "seamonkey-chat-0:1.0.3-0.el3.1.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ia64" }, "product_reference": "seamonkey-chat-0:1.0.3-0.el3.1.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ppc" }, "product_reference": "seamonkey-chat-0:1.0.3-0.el3.1.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390" }, "product_reference": "seamonkey-chat-0:1.0.3-0.el3.1.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390x" }, "product_reference": "seamonkey-chat-0:1.0.3-0.el3.1.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64" }, "product_reference": "seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386" }, "product_reference": "seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64" }, "product_reference": "seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc" }, "product_reference": "seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390" }, "product_reference": "seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x" }, "product_reference": "seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64" }, "product_reference": "seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-devel-0:1.0.3-0.el3.1.i386" }, "product_reference": "seamonkey-devel-0:1.0.3-0.el3.1.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ia64" }, "product_reference": "seamonkey-devel-0:1.0.3-0.el3.1.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ppc" }, "product_reference": "seamonkey-devel-0:1.0.3-0.el3.1.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390" }, "product_reference": "seamonkey-devel-0:1.0.3-0.el3.1.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390x" }, "product_reference": "seamonkey-devel-0:1.0.3-0.el3.1.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64" }, "product_reference": "seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386" }, "product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64" }, "product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc" }, "product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390" }, "product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x" }, "product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64" }, "product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386" }, "product_reference": "seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64" }, "product_reference": "seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc" }, "product_reference": "seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390" }, "product_reference": "seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x" }, "product_reference": "seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64" }, "product_reference": "seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-mail-0:1.0.3-0.el3.1.i386" }, "product_reference": "seamonkey-mail-0:1.0.3-0.el3.1.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ia64" }, "product_reference": "seamonkey-mail-0:1.0.3-0.el3.1.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ppc" }, "product_reference": "seamonkey-mail-0:1.0.3-0.el3.1.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390" }, "product_reference": "seamonkey-mail-0:1.0.3-0.el3.1.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390x" }, "product_reference": "seamonkey-mail-0:1.0.3-0.el3.1.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64" }, "product_reference": "seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.i386" }, "product_reference": "seamonkey-nspr-0:1.0.3-0.el3.1.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64" }, "product_reference": "seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc" }, "product_reference": "seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390" }, "product_reference": "seamonkey-nspr-0:1.0.3-0.el3.1.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x" }, "product_reference": "seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64" }, "product_reference": "seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386" }, "product_reference": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64" }, "product_reference": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc" }, "product_reference": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390" }, "product_reference": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x" }, "product_reference": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64" }, "product_reference": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nss-0:1.0.3-0.el3.1.i386" }, "product_reference": "seamonkey-nss-0:1.0.3-0.el3.1.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ia64" }, "product_reference": "seamonkey-nss-0:1.0.3-0.el3.1.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ppc" }, "product_reference": "seamonkey-nss-0:1.0.3-0.el3.1.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390" }, "product_reference": "seamonkey-nss-0:1.0.3-0.el3.1.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390x" }, "product_reference": "seamonkey-nss-0:1.0.3-0.el3.1.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64" }, "product_reference": "seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386" }, "product_reference": "seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64" }, "product_reference": "seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc" }, "product_reference": "seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390" }, "product_reference": "seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x" }, "product_reference": "seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64" }, "product_reference": "seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "relates_to_product_reference": "3WS" } ] }, "vulnerabilities": [ { "cve": "CVE-2006-3113", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618135" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox 1.5 before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via simultaneous XPCOM events, which causes a timer object to be deleted in a way that triggers memory corruption.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:seamonkey-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-0:1.0.3-0.el3.1.src", "3AS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-0:1.0.3-0.el3.1.src", "3Desktop:seamonkey-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-0:1.0.3-0.el3.1.src", "3ES:seamonkey-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-0:1.0.3-0.el3.1.src", "3WS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3113" }, { "category": "external", "summary": "RHBZ#1618135", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618135" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3113", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3113" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3113", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3113" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-27T19:53:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "3AS:seamonkey-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-0:1.0.3-0.el3.1.src", "3AS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-0:1.0.3-0.el3.1.src", "3Desktop:seamonkey-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-0:1.0.3-0.el3.1.src", "3ES:seamonkey-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-0:1.0.3-0.el3.1.src", "3WS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0608" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-3677", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618153" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox 1.5 before 1.5.0.5 and SeaMonkey before 1.0.3 allows remote attackers to execute arbitrary code by changing certain properties of the window navigator object (window.navigator) that are accessed when Java starts up, which causes a crash that leads to code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:seamonkey-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-0:1.0.3-0.el3.1.src", "3AS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-0:1.0.3-0.el3.1.src", "3Desktop:seamonkey-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-0:1.0.3-0.el3.1.src", "3ES:seamonkey-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-0:1.0.3-0.el3.1.src", "3WS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3677" }, { "category": "external", "summary": "RHBZ#1618153", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618153" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3677", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3677" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3677", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3677" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-27T19:53:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "3AS:seamonkey-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-0:1.0.3-0.el3.1.src", "3AS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-0:1.0.3-0.el3.1.src", "3Desktop:seamonkey-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-0:1.0.3-0.el3.1.src", "3ES:seamonkey-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-0:1.0.3-0.el3.1.src", "3WS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0608" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-3801", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618161" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox 1.5 before 1.5.0.5 and SeaMonkey before 1.0.3 does not properly clear a JavaScript reference to a frame or window, which leaves a pointer to a deleted object that allows remote attackers to execute arbitrary native code.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:seamonkey-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-0:1.0.3-0.el3.1.src", "3AS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-0:1.0.3-0.el3.1.src", "3Desktop:seamonkey-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-0:1.0.3-0.el3.1.src", "3ES:seamonkey-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-0:1.0.3-0.el3.1.src", "3WS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3801" }, { "category": "external", "summary": "RHBZ#1618161", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618161" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3801", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3801" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3801", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3801" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-27T19:53:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "3AS:seamonkey-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-0:1.0.3-0.el3.1.src", "3AS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-0:1.0.3-0.el3.1.src", "3Desktop:seamonkey-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-0:1.0.3-0.el3.1.src", "3ES:seamonkey-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-0:1.0.3-0.el3.1.src", "3WS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0608" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-3802", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618162" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to hijack native DOM methods from objects in another domain and conduct cross-site scripting (XSS) attacks using DOM methods of the top-level object.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:seamonkey-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-0:1.0.3-0.el3.1.src", "3AS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-0:1.0.3-0.el3.1.src", "3Desktop:seamonkey-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-0:1.0.3-0.el3.1.src", "3ES:seamonkey-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-0:1.0.3-0.el3.1.src", "3WS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3802" }, { "category": "external", "summary": "RHBZ#1618162", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618162" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3802", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3802" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3802", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3802" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-27T19:53:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "3AS:seamonkey-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-0:1.0.3-0.el3.1.src", "3AS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-0:1.0.3-0.el3.1.src", "3Desktop:seamonkey-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-0:1.0.3-0.el3.1.src", "3ES:seamonkey-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-0:1.0.3-0.el3.1.src", "3WS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0608" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2006-3803", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618163" } ], "notes": [ { "category": "description", "text": "Race condition in the JavaScript garbage collection in Mozilla Firefox 1.5 before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 might allow remote attackers to execute arbitrary code by causing the garbage collector to delete a temporary variable while it is still being used during the creation of a new Function object.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:seamonkey-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-0:1.0.3-0.el3.1.src", "3AS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-0:1.0.3-0.el3.1.src", "3Desktop:seamonkey-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-0:1.0.3-0.el3.1.src", "3ES:seamonkey-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-0:1.0.3-0.el3.1.src", "3WS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3803" }, { "category": "external", "summary": "RHBZ#1618163", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618163" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3803", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3803" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3803", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3803" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-27T19:53:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "3AS:seamonkey-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-0:1.0.3-0.el3.1.src", "3AS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-0:1.0.3-0.el3.1.src", "3Desktop:seamonkey-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-0:1.0.3-0.el3.1.src", "3ES:seamonkey-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-0:1.0.3-0.el3.1.src", "3WS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0608" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-3804", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618164" } ], "notes": [ { "category": "description", "text": "Heap-based buffer overflow in Mozilla Thunderbird before 1.5.0.5 and SeaMonkey before 1.0.3 allows remote attackers to cause a denial of service (crash) via a VCard attachment with a malformed base64 field, which copies more data than expected due to an integer underflow.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:seamonkey-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-0:1.0.3-0.el3.1.src", "3AS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-0:1.0.3-0.el3.1.src", "3Desktop:seamonkey-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-0:1.0.3-0.el3.1.src", "3ES:seamonkey-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-0:1.0.3-0.el3.1.src", "3WS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3804" }, { "category": "external", "summary": "RHBZ#1618164", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618164" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3804", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3804" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3804", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3804" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-27T19:53:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "3AS:seamonkey-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-0:1.0.3-0.el3.1.src", "3AS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-0:1.0.3-0.el3.1.src", "3Desktop:seamonkey-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-0:1.0.3-0.el3.1.src", "3ES:seamonkey-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-0:1.0.3-0.el3.1.src", "3WS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0608" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-3805", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618165" } ], "notes": [ { "category": "description", "text": "The Javascript engine in Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 might allow remote attackers to execute arbitrary code via vectors involving garbage collection that causes deletion of a temporary object that is still being used.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:seamonkey-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-0:1.0.3-0.el3.1.src", "3AS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-0:1.0.3-0.el3.1.src", "3Desktop:seamonkey-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-0:1.0.3-0.el3.1.src", "3ES:seamonkey-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-0:1.0.3-0.el3.1.src", "3WS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3805" }, { "category": "external", "summary": "RHBZ#1618165", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618165" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3805", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3805" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3805", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3805" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-27T19:53:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "3AS:seamonkey-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-0:1.0.3-0.el3.1.src", "3AS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-0:1.0.3-0.el3.1.src", "3Desktop:seamonkey-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-0:1.0.3-0.el3.1.src", "3ES:seamonkey-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-0:1.0.3-0.el3.1.src", "3WS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0608" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-3806", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618166" } ], "notes": [ { "category": "description", "text": "Multiple integer overflows in the Javascript engine in Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 might allow remote attackers to execute arbitrary code via vectors involving (1) long strings in the toSource method of the Object, Array, and String objects; and (2) unspecified \"string function arguments.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:seamonkey-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-0:1.0.3-0.el3.1.src", "3AS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-0:1.0.3-0.el3.1.src", "3Desktop:seamonkey-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-0:1.0.3-0.el3.1.src", "3ES:seamonkey-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-0:1.0.3-0.el3.1.src", "3WS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3806" }, { "category": "external", "summary": "RHBZ#1618166", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618166" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3806", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3806" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3806", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3806" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-27T19:53:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "3AS:seamonkey-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-0:1.0.3-0.el3.1.src", "3AS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-0:1.0.3-0.el3.1.src", "3Desktop:seamonkey-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-0:1.0.3-0.el3.1.src", "3ES:seamonkey-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-0:1.0.3-0.el3.1.src", "3WS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0608" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-3807", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618167" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to execute arbitrary code via script that changes the standard Object() constructor to return a reference to a privileged object and calling \"named JavaScript functions\" that use the constructor.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:seamonkey-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-0:1.0.3-0.el3.1.src", "3AS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-0:1.0.3-0.el3.1.src", "3Desktop:seamonkey-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-0:1.0.3-0.el3.1.src", "3ES:seamonkey-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-0:1.0.3-0.el3.1.src", "3WS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3807" }, { "category": "external", "summary": "RHBZ#1618167", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618167" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3807", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3807" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3807", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3807" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-27T19:53:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "3AS:seamonkey-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-0:1.0.3-0.el3.1.src", "3AS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-0:1.0.3-0.el3.1.src", "3Desktop:seamonkey-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-0:1.0.3-0.el3.1.src", "3ES:seamonkey-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-0:1.0.3-0.el3.1.src", "3WS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0608" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-3808", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618168" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox before 1.5.0.5 and SeaMonkey before 1.0.3 allows remote Proxy AutoConfig (PAC) servers to execute code with elevated privileges via a PAC script that sets the FindProxyForURL function to an eval method on a privileged object.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:seamonkey-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-0:1.0.3-0.el3.1.src", "3AS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-0:1.0.3-0.el3.1.src", "3Desktop:seamonkey-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-0:1.0.3-0.el3.1.src", "3ES:seamonkey-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-0:1.0.3-0.el3.1.src", "3WS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3808" }, { "category": "external", "summary": "RHBZ#1618168", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618168" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3808", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3808" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3808", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3808" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-27T19:53:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "3AS:seamonkey-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-0:1.0.3-0.el3.1.src", "3AS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-0:1.0.3-0.el3.1.src", "3Desktop:seamonkey-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-0:1.0.3-0.el3.1.src", "3ES:seamonkey-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-0:1.0.3-0.el3.1.src", "3WS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0608" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2006-3809", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618169" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows scripts with the UniversalBrowserRead privilege to gain UniversalXPConnect privileges and possibly execute code or obtain sensitive data by reading into a privileged context.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:seamonkey-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-0:1.0.3-0.el3.1.src", "3AS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-0:1.0.3-0.el3.1.src", "3Desktop:seamonkey-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-0:1.0.3-0.el3.1.src", "3ES:seamonkey-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-0:1.0.3-0.el3.1.src", "3WS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3809" }, { "category": "external", "summary": "RHBZ#1618169", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618169" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3809", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3809" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3809", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3809" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-27T19:53:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "3AS:seamonkey-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-0:1.0.3-0.el3.1.src", "3AS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-0:1.0.3-0.el3.1.src", "3Desktop:seamonkey-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-0:1.0.3-0.el3.1.src", "3ES:seamonkey-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-0:1.0.3-0.el3.1.src", "3WS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0608" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-3810", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618170" } ], "notes": [ { "category": "description", "text": "Cross-site scripting (XSS) vulnerability in Mozilla Firefox 1.5 before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to inject arbitrary web script or HTML via the XPCNativeWrapper(window).Function construct.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:seamonkey-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-0:1.0.3-0.el3.1.src", "3AS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-0:1.0.3-0.el3.1.src", "3Desktop:seamonkey-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-0:1.0.3-0.el3.1.src", "3ES:seamonkey-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-0:1.0.3-0.el3.1.src", "3WS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3810" }, { "category": "external", "summary": "RHBZ#1618170", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618170" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3810", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3810" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3810", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3810" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-27T19:53:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "3AS:seamonkey-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-0:1.0.3-0.el3.1.src", "3AS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-0:1.0.3-0.el3.1.src", "3Desktop:seamonkey-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-0:1.0.3-0.el3.1.src", "3ES:seamonkey-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-0:1.0.3-0.el3.1.src", "3WS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0608" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2006-3811", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618171" } ], "notes": [ { "category": "description", "text": "Multiple vulnerabilities in Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via Javascript that leads to memory corruption, including (1) nsListControlFrame::FireMenuItemActiveEvent, (2) buffer overflows in the string class in out-of-memory conditions, (3) table row and column groups, (4) \"anonymous box selectors outside of UA stylesheets,\" (5) stale references to \"removed nodes,\" and (6) running the crypto.generateCRMFRequest callback on deleted context.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:seamonkey-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-0:1.0.3-0.el3.1.src", "3AS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-0:1.0.3-0.el3.1.src", "3Desktop:seamonkey-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-0:1.0.3-0.el3.1.src", "3ES:seamonkey-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-0:1.0.3-0.el3.1.src", "3WS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3811" }, { "category": "external", "summary": "RHBZ#1618171", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618171" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3811", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3811" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3811", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3811" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-27T19:53:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "3AS:seamonkey-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-0:1.0.3-0.el3.1.src", "3AS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-0:1.0.3-0.el3.1.src", "3Desktop:seamonkey-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-0:1.0.3-0.el3.1.src", "3ES:seamonkey-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-0:1.0.3-0.el3.1.src", "3WS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0608" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-3812", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "200455" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to reference remote files and possibly load chrome: URLs by tricking the user into copying or dragging links.", "title": "Vulnerability description" }, { "category": "summary", "text": "vulnerabilities: CVE-2006-{3113,3677,3801-3812}", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:seamonkey-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-0:1.0.3-0.el3.1.src", "3AS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-0:1.0.3-0.el3.1.src", "3Desktop:seamonkey-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-0:1.0.3-0.el3.1.src", "3ES:seamonkey-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-0:1.0.3-0.el3.1.src", "3WS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3812" }, { "category": "external", "summary": "RHBZ#200455", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=200455" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3812", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3812" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3812", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3812" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-27T19:53:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "3AS:seamonkey-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-0:1.0.3-0.el3.1.src", "3AS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-0:1.0.3-0.el3.1.src", "3Desktop:seamonkey-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-0:1.0.3-0.el3.1.src", "3ES:seamonkey-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-0:1.0.3-0.el3.1.src", "3WS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0608" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "vulnerabilities: CVE-2006-{3113,3677,3801-3812}" } ] }
RHSA-2006:0609
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated seamonkey packages that fix several security bugs in the mozilla\npackage are now available for Red Hat Enterprise Linux 4.\n\nThis update has been rated as having critical security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "Seamonkey is an open source Web browser, advanced email and newsgroup\nclient, IRC chat client, and HTML editor.\n\nThe Mozilla Foundation has discontinued support for the Mozilla Suite. This\nupdate deprecates the Mozilla Suite in Red Hat Enterprise Linux 4 in\nfavor of the supported Seamonkey Suite.\n\nThis update also resolves a number of outstanding Mozilla security issues:\n\nSeveral flaws were found in the way Seamonkey processed certain javascript\nactions. A malicious web page could execute arbitrary javascript\ninstructions with the permissions of \"chrome\", allowing the page to steal\nsensitive information or install browser malware. (CVE-2006-2776,\nCVE-2006-2784, CVE-2006-2785, CVE-2006-2787, CVE-2006-3807, CVE-2006-3809,\nCVE-2006-3812)\n\nSeveral denial of service flaws were found in the way Seamonkey processed\ncertain web content. A malicious web page could crash the browser or\npossibly execute arbitrary code as the user running Seamonkey.\n(CVE-2006-2779, CVE-2006-2780, CVE-2006-3801, CVE-2006-3677, CVE-2006-3113,\nCVE-2006-3803, CVE-2006-3805, CVE-2006-3806, CVE-2006-3811)\n\nTwo flaws were found in the way Seamonkey-mail displayed malformed\ninline vcard attachments. If a victim viewed an email message containing\na carefully crafted vcard it was possible to execute arbitrary code as the\nuser running Mozilla-mail. (CVE-2006-2781, CVE-2006-3804)\n\nA cross-site scripting flaw was found in the way Seamonkey processed\nUnicode Byte-Order-Mark (BOM) markers in UTF-8 web pages. A malicious web\npage could execute a script within the browser that a web input sanitizer\ncould miss due to a malformed \"script\" tag. (CVE-2006-2783)\n\nSeveral flaws were found in the way Seamonkey processed certain javascript\nactions. A malicious web page could conduct a cross-site scripting attack\nor steal sensitive information (such as cookies owned by other domains).\n(CVE-2006-3802, CVE-2006-3810)\n\nA form file upload flaw was found in the way Seamonkey handled javascript\ninput object mutation. A malicious web page could upload an arbitrary local\nfile at form submission time without user interaction. (CVE-2006-2782)\n\nA denial of service flaw was found in the way Seamonkey called the\ncrypto.signText() javascript function. A malicious web page could crash the\nbrowser if the victim had a client certificate loaded. (CVE-2006-2778)\n\nTwo HTTP response smuggling flaws were found in the way Seamonkey processed\ncertain invalid HTTP response headers. A malicious web site could return\nspecially crafted HTTP response headers which may bypass HTTP proxy\nrestrictions. (CVE-2006-2786)\n\nA flaw was found in the way Seamonkey processed Proxy AutoConfig scripts. A\nmalicious Proxy AutoConfig server could execute arbitrary javascript\ninstructions with the permissions of \"chrome\", allowing the page to steal\nsensitive information or install browser malware. (CVE-2006-3808)\n\nA double free flaw was found in the way the nsIX509::getRawDER method was\ncalled. If a victim visited a carefully crafted web page, it was possible\nto execute arbitrary code as the user running Mozilla. (CVE-2006-2788)\n\nUsers of Mozilla are advised to upgrade to this update, which contains\nSeamonkey version 1.0.3 that corrects these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2006:0609", "url": "https://access.redhat.com/errata/RHSA-2006:0609" }, { "category": "external", "summary": "193906", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=193906" }, { "category": "external", "summary": "http://www.redhat.com/security/updates/classification/#critical", "url": "http://www.redhat.com/security/updates/classification/#critical" }, { "category": "external", "summary": "196969", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=196969" }, { "category": "external", "summary": "200161", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=200161" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2006/rhsa-2006_0609.json" } ], "title": "Red Hat Security Advisory: seamonkey security update", "tracking": { "current_release_date": "2025-09-10T13:38:42+00:00", "generator": { "date": "2025-09-10T13:38:42+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.7" } }, "id": "RHSA-2006:0609", "initial_release_date": "2006-08-02T18:39:00+00:00", "revision_history": [ { "date": "2006-08-02T18:39:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2006-08-02T00:00:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-09-10T13:38:42+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 4", "product": { "name": "Red Hat Enterprise Linux AS version 4", "product_id": "4AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::as" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop version 4", "product": { "name": "Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 4", "product": { "name": "Red Hat Enterprise Linux ES version 4", "product_id": "4ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 4", "product": { "name": "Red Hat Enterprise Linux WS version 4", "product_id": "4WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::ws" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "seamonkey-mail-0:1.0.3-0.el4.1.ia64", "product": { "name": "seamonkey-mail-0:1.0.3-0.el4.1.ia64", "product_id": "seamonkey-mail-0:1.0.3-0.el4.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-mail@1.0.3-0.el4.1?arch=ia64" } } }, { "category": "product_version", "name": "seamonkey-devel-0:1.0.3-0.el4.1.ia64", "product": { "name": "seamonkey-devel-0:1.0.3-0.el4.1.ia64", "product_id": "seamonkey-devel-0:1.0.3-0.el4.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-devel@1.0.3-0.el4.1?arch=ia64" } } }, { "category": "product_version", "name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "product": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "product_id": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-dom-inspector@1.0.3-0.el4.1?arch=ia64" } } }, { "category": "product_version", "name": "seamonkey-0:1.0.3-0.el4.1.ia64", "product": { "name": "seamonkey-0:1.0.3-0.el4.1.ia64", "product_id": "seamonkey-0:1.0.3-0.el4.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey@1.0.3-0.el4.1?arch=ia64" } } }, { "category": "product_version", "name": "seamonkey-chat-0:1.0.3-0.el4.1.ia64", "product": { "name": "seamonkey-chat-0:1.0.3-0.el4.1.ia64", "product_id": "seamonkey-chat-0:1.0.3-0.el4.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-chat@1.0.3-0.el4.1?arch=ia64" } } }, { "category": "product_version", "name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "product": { "name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "product_id": "seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-debuginfo@1.0.3-0.el4.1?arch=ia64" } } }, { "category": "product_version", "name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "product": { "name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "product_id": "seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-js-debugger@1.0.3-0.el4.1?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "product": { "name": "seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "product_id": "seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-mail@1.0.3-0.el4.1?arch=x86_64" } } }, { "category": "product_version", "name": "seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "product": { "name": "seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "product_id": "seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-devel@1.0.3-0.el4.1?arch=x86_64" } } }, { "category": "product_version", "name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "product": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "product_id": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-dom-inspector@1.0.3-0.el4.1?arch=x86_64" } } }, { "category": "product_version", "name": "seamonkey-0:1.0.3-0.el4.1.x86_64", "product": { "name": "seamonkey-0:1.0.3-0.el4.1.x86_64", "product_id": "seamonkey-0:1.0.3-0.el4.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey@1.0.3-0.el4.1?arch=x86_64" } } }, { "category": "product_version", "name": "seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "product": { "name": "seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "product_id": "seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-chat@1.0.3-0.el4.1?arch=x86_64" } } }, { "category": "product_version", "name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "product": { "name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "product_id": "seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-debuginfo@1.0.3-0.el4.1?arch=x86_64" } } }, { "category": "product_version", "name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "product": { "name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "product_id": "seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-js-debugger@1.0.3-0.el4.1?arch=x86_64" } } }, { "category": "product_version", "name": "devhelp-devel-0:0.10-0.2.el4.x86_64", "product": { "name": "devhelp-devel-0:0.10-0.2.el4.x86_64", "product_id": "devhelp-devel-0:0.10-0.2.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/devhelp-devel@0.10-0.2.el4?arch=x86_64" } } }, { "category": "product_version", "name": "devhelp-0:0.10-0.2.el4.x86_64", "product": { "name": "devhelp-0:0.10-0.2.el4.x86_64", "product_id": "devhelp-0:0.10-0.2.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/devhelp@0.10-0.2.el4?arch=x86_64" } } }, { "category": "product_version", "name": "devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "product": { "name": "devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "product_id": "devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/devhelp-debuginfo@0.10-0.2.el4?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "seamonkey-mail-0:1.0.3-0.el4.1.i386", "product": { "name": "seamonkey-mail-0:1.0.3-0.el4.1.i386", "product_id": "seamonkey-mail-0:1.0.3-0.el4.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-mail@1.0.3-0.el4.1?arch=i386" } } }, { "category": "product_version", "name": "seamonkey-devel-0:1.0.3-0.el4.1.i386", "product": { "name": "seamonkey-devel-0:1.0.3-0.el4.1.i386", "product_id": "seamonkey-devel-0:1.0.3-0.el4.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-devel@1.0.3-0.el4.1?arch=i386" } } }, { "category": "product_version", "name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "product": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "product_id": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-dom-inspector@1.0.3-0.el4.1?arch=i386" } } }, { "category": "product_version", "name": "seamonkey-0:1.0.3-0.el4.1.i386", "product": { "name": "seamonkey-0:1.0.3-0.el4.1.i386", "product_id": "seamonkey-0:1.0.3-0.el4.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey@1.0.3-0.el4.1?arch=i386" } } }, { "category": "product_version", "name": "seamonkey-chat-0:1.0.3-0.el4.1.i386", "product": { "name": "seamonkey-chat-0:1.0.3-0.el4.1.i386", "product_id": "seamonkey-chat-0:1.0.3-0.el4.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-chat@1.0.3-0.el4.1?arch=i386" } } }, { "category": "product_version", "name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "product": { "name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "product_id": "seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-debuginfo@1.0.3-0.el4.1?arch=i386" } } }, { "category": "product_version", "name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "product": { "name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "product_id": "seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-js-debugger@1.0.3-0.el4.1?arch=i386" } } }, { "category": "product_version", "name": "devhelp-devel-0:0.10-0.2.el4.i386", "product": { "name": "devhelp-devel-0:0.10-0.2.el4.i386", "product_id": "devhelp-devel-0:0.10-0.2.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/devhelp-devel@0.10-0.2.el4?arch=i386" } } }, { "category": "product_version", "name": "devhelp-0:0.10-0.2.el4.i386", "product": { "name": "devhelp-0:0.10-0.2.el4.i386", "product_id": "devhelp-0:0.10-0.2.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/devhelp@0.10-0.2.el4?arch=i386" } } }, { "category": "product_version", "name": "devhelp-debuginfo-0:0.10-0.2.el4.i386", "product": { "name": "devhelp-debuginfo-0:0.10-0.2.el4.i386", "product_id": "devhelp-debuginfo-0:0.10-0.2.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/devhelp-debuginfo@0.10-0.2.el4?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "seamonkey-0:1.0.3-0.el4.1.src", "product": { "name": "seamonkey-0:1.0.3-0.el4.1.src", "product_id": "seamonkey-0:1.0.3-0.el4.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey@1.0.3-0.el4.1?arch=src" } } }, { "category": "product_version", "name": "devhelp-0:0.10-0.2.el4.src", "product": { "name": "devhelp-0:0.10-0.2.el4.src", "product_id": "devhelp-0:0.10-0.2.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/devhelp@0.10-0.2.el4?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "seamonkey-mail-0:1.0.3-0.el4.1.ppc", "product": { "name": "seamonkey-mail-0:1.0.3-0.el4.1.ppc", "product_id": "seamonkey-mail-0:1.0.3-0.el4.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-mail@1.0.3-0.el4.1?arch=ppc" } } }, { "category": "product_version", "name": "seamonkey-devel-0:1.0.3-0.el4.1.ppc", "product": { "name": "seamonkey-devel-0:1.0.3-0.el4.1.ppc", "product_id": "seamonkey-devel-0:1.0.3-0.el4.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-devel@1.0.3-0.el4.1?arch=ppc" } } }, { "category": "product_version", "name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "product": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "product_id": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-dom-inspector@1.0.3-0.el4.1?arch=ppc" } } }, { "category": "product_version", "name": "seamonkey-0:1.0.3-0.el4.1.ppc", "product": { "name": "seamonkey-0:1.0.3-0.el4.1.ppc", "product_id": "seamonkey-0:1.0.3-0.el4.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey@1.0.3-0.el4.1?arch=ppc" } } }, { "category": "product_version", "name": "seamonkey-chat-0:1.0.3-0.el4.1.ppc", "product": { "name": "seamonkey-chat-0:1.0.3-0.el4.1.ppc", "product_id": "seamonkey-chat-0:1.0.3-0.el4.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-chat@1.0.3-0.el4.1?arch=ppc" } } }, { "category": "product_version", "name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "product": { "name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "product_id": "seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-debuginfo@1.0.3-0.el4.1?arch=ppc" } } }, { "category": "product_version", "name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "product": { "name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "product_id": "seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-js-debugger@1.0.3-0.el4.1?arch=ppc" } } }, { "category": "product_version", "name": "devhelp-devel-0:0.10-0.2.el4.ppc", "product": { "name": "devhelp-devel-0:0.10-0.2.el4.ppc", "product_id": "devhelp-devel-0:0.10-0.2.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/devhelp-devel@0.10-0.2.el4?arch=ppc" } } }, { "category": "product_version", "name": "devhelp-0:0.10-0.2.el4.ppc", "product": { "name": "devhelp-0:0.10-0.2.el4.ppc", "product_id": "devhelp-0:0.10-0.2.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/devhelp@0.10-0.2.el4?arch=ppc" } } }, { "category": "product_version", "name": "devhelp-debuginfo-0:0.10-0.2.el4.ppc", "product": { "name": "devhelp-debuginfo-0:0.10-0.2.el4.ppc", "product_id": "devhelp-debuginfo-0:0.10-0.2.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/devhelp-debuginfo@0.10-0.2.el4?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "seamonkey-mail-0:1.0.3-0.el4.1.s390x", "product": { "name": "seamonkey-mail-0:1.0.3-0.el4.1.s390x", "product_id": "seamonkey-mail-0:1.0.3-0.el4.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-mail@1.0.3-0.el4.1?arch=s390x" } } }, { "category": "product_version", "name": "seamonkey-devel-0:1.0.3-0.el4.1.s390x", "product": { "name": "seamonkey-devel-0:1.0.3-0.el4.1.s390x", "product_id": "seamonkey-devel-0:1.0.3-0.el4.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-devel@1.0.3-0.el4.1?arch=s390x" } } }, { "category": "product_version", "name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "product": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "product_id": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-dom-inspector@1.0.3-0.el4.1?arch=s390x" } } }, { "category": "product_version", "name": "seamonkey-0:1.0.3-0.el4.1.s390x", "product": { "name": "seamonkey-0:1.0.3-0.el4.1.s390x", "product_id": "seamonkey-0:1.0.3-0.el4.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey@1.0.3-0.el4.1?arch=s390x" } } }, { "category": "product_version", "name": "seamonkey-chat-0:1.0.3-0.el4.1.s390x", "product": { "name": "seamonkey-chat-0:1.0.3-0.el4.1.s390x", "product_id": "seamonkey-chat-0:1.0.3-0.el4.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-chat@1.0.3-0.el4.1?arch=s390x" } } }, { "category": "product_version", "name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "product": { "name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "product_id": "seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-debuginfo@1.0.3-0.el4.1?arch=s390x" } } }, { "category": "product_version", "name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "product": { "name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "product_id": "seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-js-debugger@1.0.3-0.el4.1?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "seamonkey-mail-0:1.0.3-0.el4.1.s390", "product": { "name": "seamonkey-mail-0:1.0.3-0.el4.1.s390", "product_id": "seamonkey-mail-0:1.0.3-0.el4.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-mail@1.0.3-0.el4.1?arch=s390" } } }, { "category": "product_version", "name": "seamonkey-devel-0:1.0.3-0.el4.1.s390", "product": { "name": "seamonkey-devel-0:1.0.3-0.el4.1.s390", "product_id": "seamonkey-devel-0:1.0.3-0.el4.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-devel@1.0.3-0.el4.1?arch=s390" } } }, { "category": "product_version", "name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "product": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "product_id": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-dom-inspector@1.0.3-0.el4.1?arch=s390" } } }, { "category": "product_version", "name": "seamonkey-0:1.0.3-0.el4.1.s390", "product": { "name": "seamonkey-0:1.0.3-0.el4.1.s390", "product_id": "seamonkey-0:1.0.3-0.el4.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey@1.0.3-0.el4.1?arch=s390" } } }, { "category": "product_version", "name": "seamonkey-chat-0:1.0.3-0.el4.1.s390", "product": { "name": "seamonkey-chat-0:1.0.3-0.el4.1.s390", "product_id": "seamonkey-chat-0:1.0.3-0.el4.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-chat@1.0.3-0.el4.1?arch=s390" } } }, { "category": "product_version", "name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "product": { "name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "product_id": "seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-debuginfo@1.0.3-0.el4.1?arch=s390" } } }, { "category": "product_version", "name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "product": { "name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "product_id": "seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-js-debugger@1.0.3-0.el4.1?arch=s390" } } } ], "category": "architecture", "name": "s390" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "devhelp-0:0.10-0.2.el4.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:devhelp-0:0.10-0.2.el4.i386" }, "product_reference": "devhelp-0:0.10-0.2.el4.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-0:0.10-0.2.el4.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:devhelp-0:0.10-0.2.el4.ppc" }, "product_reference": "devhelp-0:0.10-0.2.el4.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-0:0.10-0.2.el4.src as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:devhelp-0:0.10-0.2.el4.src" }, "product_reference": "devhelp-0:0.10-0.2.el4.src", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-0:0.10-0.2.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:devhelp-0:0.10-0.2.el4.x86_64" }, "product_reference": "devhelp-0:0.10-0.2.el4.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-debuginfo-0:0.10-0.2.el4.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386" }, "product_reference": "devhelp-debuginfo-0:0.10-0.2.el4.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-debuginfo-0:0.10-0.2.el4.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc" }, "product_reference": "devhelp-debuginfo-0:0.10-0.2.el4.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-debuginfo-0:0.10-0.2.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64" }, "product_reference": "devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-devel-0:0.10-0.2.el4.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:devhelp-devel-0:0.10-0.2.el4.i386" }, "product_reference": "devhelp-devel-0:0.10-0.2.el4.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-devel-0:0.10-0.2.el4.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:devhelp-devel-0:0.10-0.2.el4.ppc" }, "product_reference": "devhelp-devel-0:0.10-0.2.el4.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-devel-0:0.10-0.2.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64" }, "product_reference": "devhelp-devel-0:0.10-0.2.el4.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el4.1.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-0:1.0.3-0.el4.1.i386" }, "product_reference": "seamonkey-0:1.0.3-0.el4.1.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el4.1.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-0:1.0.3-0.el4.1.ia64" }, "product_reference": "seamonkey-0:1.0.3-0.el4.1.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el4.1.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-0:1.0.3-0.el4.1.ppc" }, "product_reference": "seamonkey-0:1.0.3-0.el4.1.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el4.1.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-0:1.0.3-0.el4.1.s390" }, "product_reference": "seamonkey-0:1.0.3-0.el4.1.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el4.1.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-0:1.0.3-0.el4.1.s390x" }, "product_reference": "seamonkey-0:1.0.3-0.el4.1.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el4.1.src as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-0:1.0.3-0.el4.1.src" }, "product_reference": "seamonkey-0:1.0.3-0.el4.1.src", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64" }, "product_reference": "seamonkey-0:1.0.3-0.el4.1.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.3-0.el4.1.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386" }, "product_reference": "seamonkey-chat-0:1.0.3-0.el4.1.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.3-0.el4.1.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64" }, "product_reference": "seamonkey-chat-0:1.0.3-0.el4.1.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.3-0.el4.1.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc" }, "product_reference": "seamonkey-chat-0:1.0.3-0.el4.1.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.3-0.el4.1.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390" }, "product_reference": "seamonkey-chat-0:1.0.3-0.el4.1.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.3-0.el4.1.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x" }, "product_reference": "seamonkey-chat-0:1.0.3-0.el4.1.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.3-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64" }, "product_reference": "seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386" }, "product_reference": "seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64" }, "product_reference": "seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc" }, "product_reference": "seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390" }, "product_reference": "seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x" }, "product_reference": "seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64" }, "product_reference": "seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.3-0.el4.1.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386" }, "product_reference": "seamonkey-devel-0:1.0.3-0.el4.1.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.3-0.el4.1.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64" }, "product_reference": "seamonkey-devel-0:1.0.3-0.el4.1.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.3-0.el4.1.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc" }, "product_reference": "seamonkey-devel-0:1.0.3-0.el4.1.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.3-0.el4.1.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390" }, "product_reference": "seamonkey-devel-0:1.0.3-0.el4.1.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.3-0.el4.1.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x" }, "product_reference": "seamonkey-devel-0:1.0.3-0.el4.1.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.3-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64" }, "product_reference": "seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386" }, "product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64" }, "product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc" }, "product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390" }, "product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x" }, "product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64" }, "product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386" }, "product_reference": "seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64" }, "product_reference": "seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc" }, "product_reference": "seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390" }, "product_reference": "seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x" }, "product_reference": "seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64" }, "product_reference": "seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.3-0.el4.1.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386" }, "product_reference": "seamonkey-mail-0:1.0.3-0.el4.1.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.3-0.el4.1.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64" }, "product_reference": "seamonkey-mail-0:1.0.3-0.el4.1.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.3-0.el4.1.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc" }, "product_reference": "seamonkey-mail-0:1.0.3-0.el4.1.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.3-0.el4.1.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390" }, "product_reference": "seamonkey-mail-0:1.0.3-0.el4.1.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.3-0.el4.1.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x" }, "product_reference": "seamonkey-mail-0:1.0.3-0.el4.1.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.3-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" }, "product_reference": "seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-0:0.10-0.2.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:devhelp-0:0.10-0.2.el4.i386" }, "product_reference": "devhelp-0:0.10-0.2.el4.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-0:0.10-0.2.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:devhelp-0:0.10-0.2.el4.ppc" }, "product_reference": "devhelp-0:0.10-0.2.el4.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-0:0.10-0.2.el4.src as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:devhelp-0:0.10-0.2.el4.src" }, "product_reference": "devhelp-0:0.10-0.2.el4.src", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-0:0.10-0.2.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:devhelp-0:0.10-0.2.el4.x86_64" }, "product_reference": "devhelp-0:0.10-0.2.el4.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-debuginfo-0:0.10-0.2.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386" }, "product_reference": "devhelp-debuginfo-0:0.10-0.2.el4.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-debuginfo-0:0.10-0.2.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc" }, "product_reference": "devhelp-debuginfo-0:0.10-0.2.el4.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-debuginfo-0:0.10-0.2.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64" }, "product_reference": "devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-devel-0:0.10-0.2.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386" }, "product_reference": "devhelp-devel-0:0.10-0.2.el4.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-devel-0:0.10-0.2.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc" }, "product_reference": "devhelp-devel-0:0.10-0.2.el4.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-devel-0:0.10-0.2.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64" }, "product_reference": "devhelp-devel-0:0.10-0.2.el4.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el4.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386" }, "product_reference": "seamonkey-0:1.0.3-0.el4.1.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el4.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64" }, "product_reference": "seamonkey-0:1.0.3-0.el4.1.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el4.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc" }, "product_reference": "seamonkey-0:1.0.3-0.el4.1.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el4.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390" }, "product_reference": "seamonkey-0:1.0.3-0.el4.1.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el4.1.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x" }, "product_reference": "seamonkey-0:1.0.3-0.el4.1.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el4.1.src as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-0:1.0.3-0.el4.1.src" }, "product_reference": "seamonkey-0:1.0.3-0.el4.1.src", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64" }, "product_reference": "seamonkey-0:1.0.3-0.el4.1.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.3-0.el4.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386" }, "product_reference": "seamonkey-chat-0:1.0.3-0.el4.1.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.3-0.el4.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64" }, "product_reference": "seamonkey-chat-0:1.0.3-0.el4.1.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.3-0.el4.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc" }, "product_reference": "seamonkey-chat-0:1.0.3-0.el4.1.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.3-0.el4.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390" }, "product_reference": "seamonkey-chat-0:1.0.3-0.el4.1.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.3-0.el4.1.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x" }, "product_reference": "seamonkey-chat-0:1.0.3-0.el4.1.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.3-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64" }, "product_reference": "seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386" }, "product_reference": "seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64" }, "product_reference": "seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc" }, "product_reference": "seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390" }, "product_reference": "seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x" }, "product_reference": "seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64" }, "product_reference": "seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.3-0.el4.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386" }, "product_reference": "seamonkey-devel-0:1.0.3-0.el4.1.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.3-0.el4.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64" }, "product_reference": "seamonkey-devel-0:1.0.3-0.el4.1.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.3-0.el4.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc" }, "product_reference": "seamonkey-devel-0:1.0.3-0.el4.1.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.3-0.el4.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390" }, "product_reference": "seamonkey-devel-0:1.0.3-0.el4.1.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.3-0.el4.1.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x" }, "product_reference": "seamonkey-devel-0:1.0.3-0.el4.1.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.3-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64" }, "product_reference": "seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386" }, "product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64" }, "product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc" }, "product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390" }, "product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x" }, "product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64" }, "product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386" }, "product_reference": "seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64" }, "product_reference": "seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc" }, "product_reference": "seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390" }, "product_reference": "seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x" }, "product_reference": "seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64" }, "product_reference": "seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.3-0.el4.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386" }, "product_reference": "seamonkey-mail-0:1.0.3-0.el4.1.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.3-0.el4.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64" }, "product_reference": "seamonkey-mail-0:1.0.3-0.el4.1.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.3-0.el4.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc" }, "product_reference": "seamonkey-mail-0:1.0.3-0.el4.1.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.3-0.el4.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390" }, "product_reference": "seamonkey-mail-0:1.0.3-0.el4.1.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.3-0.el4.1.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x" }, "product_reference": "seamonkey-mail-0:1.0.3-0.el4.1.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.3-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" }, "product_reference": "seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-0:0.10-0.2.el4.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:devhelp-0:0.10-0.2.el4.i386" }, "product_reference": "devhelp-0:0.10-0.2.el4.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-0:0.10-0.2.el4.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:devhelp-0:0.10-0.2.el4.ppc" }, "product_reference": "devhelp-0:0.10-0.2.el4.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-0:0.10-0.2.el4.src as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:devhelp-0:0.10-0.2.el4.src" }, "product_reference": "devhelp-0:0.10-0.2.el4.src", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-0:0.10-0.2.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:devhelp-0:0.10-0.2.el4.x86_64" }, "product_reference": "devhelp-0:0.10-0.2.el4.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-debuginfo-0:0.10-0.2.el4.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386" }, "product_reference": "devhelp-debuginfo-0:0.10-0.2.el4.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-debuginfo-0:0.10-0.2.el4.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc" }, "product_reference": "devhelp-debuginfo-0:0.10-0.2.el4.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-debuginfo-0:0.10-0.2.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64" }, "product_reference": "devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-devel-0:0.10-0.2.el4.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:devhelp-devel-0:0.10-0.2.el4.i386" }, "product_reference": "devhelp-devel-0:0.10-0.2.el4.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-devel-0:0.10-0.2.el4.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:devhelp-devel-0:0.10-0.2.el4.ppc" }, "product_reference": "devhelp-devel-0:0.10-0.2.el4.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-devel-0:0.10-0.2.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64" }, "product_reference": "devhelp-devel-0:0.10-0.2.el4.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el4.1.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-0:1.0.3-0.el4.1.i386" }, "product_reference": "seamonkey-0:1.0.3-0.el4.1.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el4.1.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-0:1.0.3-0.el4.1.ia64" }, "product_reference": "seamonkey-0:1.0.3-0.el4.1.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el4.1.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-0:1.0.3-0.el4.1.ppc" }, "product_reference": "seamonkey-0:1.0.3-0.el4.1.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el4.1.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-0:1.0.3-0.el4.1.s390" }, "product_reference": "seamonkey-0:1.0.3-0.el4.1.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el4.1.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-0:1.0.3-0.el4.1.s390x" }, "product_reference": "seamonkey-0:1.0.3-0.el4.1.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el4.1.src as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-0:1.0.3-0.el4.1.src" }, "product_reference": "seamonkey-0:1.0.3-0.el4.1.src", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64" }, "product_reference": "seamonkey-0:1.0.3-0.el4.1.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.3-0.el4.1.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386" }, "product_reference": "seamonkey-chat-0:1.0.3-0.el4.1.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.3-0.el4.1.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64" }, "product_reference": "seamonkey-chat-0:1.0.3-0.el4.1.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.3-0.el4.1.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc" }, "product_reference": "seamonkey-chat-0:1.0.3-0.el4.1.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.3-0.el4.1.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390" }, "product_reference": "seamonkey-chat-0:1.0.3-0.el4.1.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.3-0.el4.1.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x" }, "product_reference": "seamonkey-chat-0:1.0.3-0.el4.1.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.3-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64" }, "product_reference": "seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386" }, "product_reference": "seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64" }, "product_reference": "seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc" }, "product_reference": "seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390" }, "product_reference": "seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x" }, "product_reference": "seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64" }, "product_reference": "seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.3-0.el4.1.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386" }, "product_reference": "seamonkey-devel-0:1.0.3-0.el4.1.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.3-0.el4.1.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64" }, "product_reference": "seamonkey-devel-0:1.0.3-0.el4.1.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.3-0.el4.1.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc" }, "product_reference": "seamonkey-devel-0:1.0.3-0.el4.1.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.3-0.el4.1.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390" }, "product_reference": "seamonkey-devel-0:1.0.3-0.el4.1.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.3-0.el4.1.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x" }, "product_reference": "seamonkey-devel-0:1.0.3-0.el4.1.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.3-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64" }, "product_reference": "seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386" }, "product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64" }, "product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc" }, "product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390" }, "product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x" }, "product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64" }, "product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386" }, "product_reference": "seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64" }, "product_reference": "seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc" }, "product_reference": "seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390" }, "product_reference": "seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x" }, "product_reference": "seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64" }, "product_reference": "seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.3-0.el4.1.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386" }, "product_reference": "seamonkey-mail-0:1.0.3-0.el4.1.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.3-0.el4.1.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64" }, "product_reference": "seamonkey-mail-0:1.0.3-0.el4.1.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.3-0.el4.1.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc" }, "product_reference": "seamonkey-mail-0:1.0.3-0.el4.1.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.3-0.el4.1.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390" }, "product_reference": "seamonkey-mail-0:1.0.3-0.el4.1.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.3-0.el4.1.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x" }, "product_reference": "seamonkey-mail-0:1.0.3-0.el4.1.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.3-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" }, "product_reference": "seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-0:0.10-0.2.el4.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:devhelp-0:0.10-0.2.el4.i386" }, "product_reference": "devhelp-0:0.10-0.2.el4.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-0:0.10-0.2.el4.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:devhelp-0:0.10-0.2.el4.ppc" }, "product_reference": "devhelp-0:0.10-0.2.el4.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-0:0.10-0.2.el4.src as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:devhelp-0:0.10-0.2.el4.src" }, "product_reference": "devhelp-0:0.10-0.2.el4.src", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-0:0.10-0.2.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:devhelp-0:0.10-0.2.el4.x86_64" }, "product_reference": "devhelp-0:0.10-0.2.el4.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-debuginfo-0:0.10-0.2.el4.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386" }, "product_reference": "devhelp-debuginfo-0:0.10-0.2.el4.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-debuginfo-0:0.10-0.2.el4.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc" }, "product_reference": "devhelp-debuginfo-0:0.10-0.2.el4.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-debuginfo-0:0.10-0.2.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64" }, "product_reference": "devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-devel-0:0.10-0.2.el4.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:devhelp-devel-0:0.10-0.2.el4.i386" }, "product_reference": "devhelp-devel-0:0.10-0.2.el4.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-devel-0:0.10-0.2.el4.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:devhelp-devel-0:0.10-0.2.el4.ppc" }, "product_reference": "devhelp-devel-0:0.10-0.2.el4.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-devel-0:0.10-0.2.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64" }, "product_reference": "devhelp-devel-0:0.10-0.2.el4.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el4.1.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-0:1.0.3-0.el4.1.i386" }, "product_reference": "seamonkey-0:1.0.3-0.el4.1.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el4.1.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-0:1.0.3-0.el4.1.ia64" }, "product_reference": "seamonkey-0:1.0.3-0.el4.1.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el4.1.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-0:1.0.3-0.el4.1.ppc" }, "product_reference": "seamonkey-0:1.0.3-0.el4.1.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el4.1.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-0:1.0.3-0.el4.1.s390" }, "product_reference": "seamonkey-0:1.0.3-0.el4.1.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el4.1.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-0:1.0.3-0.el4.1.s390x" }, "product_reference": "seamonkey-0:1.0.3-0.el4.1.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el4.1.src as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-0:1.0.3-0.el4.1.src" }, "product_reference": "seamonkey-0:1.0.3-0.el4.1.src", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64" }, "product_reference": "seamonkey-0:1.0.3-0.el4.1.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.3-0.el4.1.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386" }, "product_reference": "seamonkey-chat-0:1.0.3-0.el4.1.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.3-0.el4.1.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64" }, "product_reference": "seamonkey-chat-0:1.0.3-0.el4.1.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.3-0.el4.1.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc" }, "product_reference": "seamonkey-chat-0:1.0.3-0.el4.1.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.3-0.el4.1.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390" }, "product_reference": "seamonkey-chat-0:1.0.3-0.el4.1.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.3-0.el4.1.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x" }, "product_reference": "seamonkey-chat-0:1.0.3-0.el4.1.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.3-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64" }, "product_reference": "seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386" }, "product_reference": "seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64" }, "product_reference": "seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc" }, "product_reference": "seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390" }, "product_reference": "seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x" }, "product_reference": "seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64" }, "product_reference": "seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.3-0.el4.1.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386" }, "product_reference": "seamonkey-devel-0:1.0.3-0.el4.1.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.3-0.el4.1.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64" }, "product_reference": "seamonkey-devel-0:1.0.3-0.el4.1.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.3-0.el4.1.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc" }, "product_reference": "seamonkey-devel-0:1.0.3-0.el4.1.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.3-0.el4.1.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390" }, "product_reference": "seamonkey-devel-0:1.0.3-0.el4.1.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.3-0.el4.1.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x" }, "product_reference": "seamonkey-devel-0:1.0.3-0.el4.1.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.3-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64" }, "product_reference": "seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386" }, "product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64" }, "product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc" }, "product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390" }, "product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x" }, "product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64" }, "product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386" }, "product_reference": "seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64" }, "product_reference": "seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc" }, "product_reference": "seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390" }, "product_reference": "seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x" }, "product_reference": "seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64" }, "product_reference": "seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.3-0.el4.1.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386" }, "product_reference": "seamonkey-mail-0:1.0.3-0.el4.1.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.3-0.el4.1.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64" }, "product_reference": "seamonkey-mail-0:1.0.3-0.el4.1.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.3-0.el4.1.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc" }, "product_reference": "seamonkey-mail-0:1.0.3-0.el4.1.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.3-0.el4.1.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390" }, "product_reference": "seamonkey-mail-0:1.0.3-0.el4.1.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.3-0.el4.1.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x" }, "product_reference": "seamonkey-mail-0:1.0.3-0.el4.1.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.3-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" }, "product_reference": "seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "relates_to_product_reference": "4WS" } ] }, "vulnerabilities": [ { "cve": "CVE-2006-2776", "discovery_date": "2006-05-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618112" } ], "notes": [ { "category": "description", "text": "Certain privileged UI code in Mozilla Firefox and Thunderbird before 1.5.0.4 calls content-defined setters on an object prototype, which allows remote attackers to execute code at a higher privilege than intended.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:devhelp-0:0.10-0.2.el4.i386", "4AS:devhelp-0:0.10-0.2.el4.ppc", "4AS:devhelp-0:0.10-0.2.el4.src", "4AS:devhelp-0:0.10-0.2.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.2.el4.i386", "4AS:devhelp-devel-0:0.10-0.2.el4.ppc", "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4AS:seamonkey-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-0:1.0.3-0.el4.1.src", "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4Desktop:devhelp-0:0.10-0.2.el4.i386", "4Desktop:devhelp-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-0:0.10-0.2.el4.src", "4Desktop:devhelp-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-0:1.0.3-0.el4.1.src", "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4ES:devhelp-0:0.10-0.2.el4.i386", "4ES:devhelp-0:0.10-0.2.el4.ppc", "4ES:devhelp-0:0.10-0.2.el4.src", "4ES:devhelp-0:0.10-0.2.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.2.el4.i386", "4ES:devhelp-devel-0:0.10-0.2.el4.ppc", "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64", "4ES:seamonkey-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-0:1.0.3-0.el4.1.src", "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4WS:devhelp-0:0.10-0.2.el4.i386", "4WS:devhelp-0:0.10-0.2.el4.ppc", "4WS:devhelp-0:0.10-0.2.el4.src", "4WS:devhelp-0:0.10-0.2.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.2.el4.i386", "4WS:devhelp-devel-0:0.10-0.2.el4.ppc", "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4WS:seamonkey-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-0:1.0.3-0.el4.1.src", "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2776" }, { "category": "external", "summary": "RHBZ#1618112", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618112" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2776", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2776" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2776", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2776" } ], "release_date": "2006-06-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-08-02T18:39:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nMultilib systems may experience difficulty if trying to specify the package\nby name to the Update Agent via a command line argument. This can be\nsolved by executing the following commands:\n\nup2date seamonkey; up2date seamonkey-nss seamonkey-nspr", "product_ids": [ "4AS:devhelp-0:0.10-0.2.el4.i386", "4AS:devhelp-0:0.10-0.2.el4.ppc", "4AS:devhelp-0:0.10-0.2.el4.src", "4AS:devhelp-0:0.10-0.2.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.2.el4.i386", "4AS:devhelp-devel-0:0.10-0.2.el4.ppc", "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4AS:seamonkey-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-0:1.0.3-0.el4.1.src", "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4Desktop:devhelp-0:0.10-0.2.el4.i386", "4Desktop:devhelp-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-0:0.10-0.2.el4.src", "4Desktop:devhelp-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-0:1.0.3-0.el4.1.src", "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4ES:devhelp-0:0.10-0.2.el4.i386", "4ES:devhelp-0:0.10-0.2.el4.ppc", "4ES:devhelp-0:0.10-0.2.el4.src", "4ES:devhelp-0:0.10-0.2.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.2.el4.i386", "4ES:devhelp-devel-0:0.10-0.2.el4.ppc", "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64", "4ES:seamonkey-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-0:1.0.3-0.el4.1.src", "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4WS:devhelp-0:0.10-0.2.el4.i386", "4WS:devhelp-0:0.10-0.2.el4.ppc", "4WS:devhelp-0:0.10-0.2.el4.src", "4WS:devhelp-0:0.10-0.2.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.2.el4.i386", "4WS:devhelp-devel-0:0.10-0.2.el4.ppc", "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4WS:seamonkey-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-0:1.0.3-0.el4.1.src", "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0609" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2006-2778", "discovery_date": "2006-05-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618113" } ], "notes": [ { "category": "description", "text": "The crypto.signText function in Mozilla Firefox and Thunderbird before 1.5.0.4 allows remote attackers to execute arbitrary code via certain optional Certificate Authority name arguments, which causes an invalid array index and triggers a buffer overflow.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:devhelp-0:0.10-0.2.el4.i386", "4AS:devhelp-0:0.10-0.2.el4.ppc", "4AS:devhelp-0:0.10-0.2.el4.src", "4AS:devhelp-0:0.10-0.2.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.2.el4.i386", "4AS:devhelp-devel-0:0.10-0.2.el4.ppc", "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4AS:seamonkey-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-0:1.0.3-0.el4.1.src", "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4Desktop:devhelp-0:0.10-0.2.el4.i386", "4Desktop:devhelp-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-0:0.10-0.2.el4.src", "4Desktop:devhelp-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-0:1.0.3-0.el4.1.src", "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4ES:devhelp-0:0.10-0.2.el4.i386", "4ES:devhelp-0:0.10-0.2.el4.ppc", "4ES:devhelp-0:0.10-0.2.el4.src", "4ES:devhelp-0:0.10-0.2.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.2.el4.i386", "4ES:devhelp-devel-0:0.10-0.2.el4.ppc", "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64", "4ES:seamonkey-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-0:1.0.3-0.el4.1.src", "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4WS:devhelp-0:0.10-0.2.el4.i386", "4WS:devhelp-0:0.10-0.2.el4.ppc", "4WS:devhelp-0:0.10-0.2.el4.src", "4WS:devhelp-0:0.10-0.2.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.2.el4.i386", "4WS:devhelp-devel-0:0.10-0.2.el4.ppc", "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4WS:seamonkey-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-0:1.0.3-0.el4.1.src", "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2778" }, { "category": "external", "summary": "RHBZ#1618113", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618113" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2778", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2778" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2778", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2778" } ], "release_date": "2006-06-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-08-02T18:39:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nMultilib systems may experience difficulty if trying to specify the package\nby name to the Update Agent via a command line argument. This can be\nsolved by executing the following commands:\n\nup2date seamonkey; up2date seamonkey-nss seamonkey-nspr", "product_ids": [ "4AS:devhelp-0:0.10-0.2.el4.i386", "4AS:devhelp-0:0.10-0.2.el4.ppc", "4AS:devhelp-0:0.10-0.2.el4.src", "4AS:devhelp-0:0.10-0.2.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.2.el4.i386", "4AS:devhelp-devel-0:0.10-0.2.el4.ppc", "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4AS:seamonkey-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-0:1.0.3-0.el4.1.src", "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4Desktop:devhelp-0:0.10-0.2.el4.i386", "4Desktop:devhelp-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-0:0.10-0.2.el4.src", "4Desktop:devhelp-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-0:1.0.3-0.el4.1.src", "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4ES:devhelp-0:0.10-0.2.el4.i386", "4ES:devhelp-0:0.10-0.2.el4.ppc", "4ES:devhelp-0:0.10-0.2.el4.src", "4ES:devhelp-0:0.10-0.2.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.2.el4.i386", "4ES:devhelp-devel-0:0.10-0.2.el4.ppc", "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64", "4ES:seamonkey-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-0:1.0.3-0.el4.1.src", "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4WS:devhelp-0:0.10-0.2.el4.i386", "4WS:devhelp-0:0.10-0.2.el4.ppc", "4WS:devhelp-0:0.10-0.2.el4.src", "4WS:devhelp-0:0.10-0.2.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.2.el4.i386", "4WS:devhelp-devel-0:0.10-0.2.el4.ppc", "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4WS:seamonkey-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-0:1.0.3-0.el4.1.src", "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0609" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2006-2779", "discovery_date": "2006-06-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618114" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox and Thunderbird before 1.5.0.4 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via (1) nested \u003coption\u003e tags in a select tag, (2) a DOMNodeRemoved mutation event, (3) \"Content-implemented tree views,\" (4) BoxObjects, (5) the XBL implementation, (6) an iframe that attempts to remove itself, which leads to memory corruption.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:devhelp-0:0.10-0.2.el4.i386", "4AS:devhelp-0:0.10-0.2.el4.ppc", "4AS:devhelp-0:0.10-0.2.el4.src", "4AS:devhelp-0:0.10-0.2.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.2.el4.i386", "4AS:devhelp-devel-0:0.10-0.2.el4.ppc", "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4AS:seamonkey-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-0:1.0.3-0.el4.1.src", "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4Desktop:devhelp-0:0.10-0.2.el4.i386", "4Desktop:devhelp-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-0:0.10-0.2.el4.src", "4Desktop:devhelp-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-0:1.0.3-0.el4.1.src", "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4ES:devhelp-0:0.10-0.2.el4.i386", "4ES:devhelp-0:0.10-0.2.el4.ppc", "4ES:devhelp-0:0.10-0.2.el4.src", "4ES:devhelp-0:0.10-0.2.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.2.el4.i386", "4ES:devhelp-devel-0:0.10-0.2.el4.ppc", "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64", "4ES:seamonkey-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-0:1.0.3-0.el4.1.src", "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4WS:devhelp-0:0.10-0.2.el4.i386", "4WS:devhelp-0:0.10-0.2.el4.ppc", "4WS:devhelp-0:0.10-0.2.el4.src", "4WS:devhelp-0:0.10-0.2.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.2.el4.i386", "4WS:devhelp-devel-0:0.10-0.2.el4.ppc", "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4WS:seamonkey-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-0:1.0.3-0.el4.1.src", "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2779" }, { "category": "external", "summary": "RHBZ#1618114", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618114" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2779", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2779" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2779", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2779" } ], "release_date": "2006-06-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-08-02T18:39:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nMultilib systems may experience difficulty if trying to specify the package\nby name to the Update Agent via a command line argument. This can be\nsolved by executing the following commands:\n\nup2date seamonkey; up2date seamonkey-nss seamonkey-nspr", "product_ids": [ "4AS:devhelp-0:0.10-0.2.el4.i386", "4AS:devhelp-0:0.10-0.2.el4.ppc", "4AS:devhelp-0:0.10-0.2.el4.src", "4AS:devhelp-0:0.10-0.2.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.2.el4.i386", "4AS:devhelp-devel-0:0.10-0.2.el4.ppc", "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4AS:seamonkey-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-0:1.0.3-0.el4.1.src", "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4Desktop:devhelp-0:0.10-0.2.el4.i386", "4Desktop:devhelp-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-0:0.10-0.2.el4.src", "4Desktop:devhelp-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-0:1.0.3-0.el4.1.src", "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4ES:devhelp-0:0.10-0.2.el4.i386", "4ES:devhelp-0:0.10-0.2.el4.ppc", "4ES:devhelp-0:0.10-0.2.el4.src", "4ES:devhelp-0:0.10-0.2.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.2.el4.i386", "4ES:devhelp-devel-0:0.10-0.2.el4.ppc", "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64", "4ES:seamonkey-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-0:1.0.3-0.el4.1.src", "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4WS:devhelp-0:0.10-0.2.el4.i386", "4WS:devhelp-0:0.10-0.2.el4.ppc", "4WS:devhelp-0:0.10-0.2.el4.src", "4WS:devhelp-0:0.10-0.2.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.2.el4.i386", "4WS:devhelp-devel-0:0.10-0.2.el4.ppc", "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4WS:seamonkey-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-0:1.0.3-0.el4.1.src", "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0609" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-2780", "discovery_date": "2006-06-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618115" } ], "notes": [ { "category": "description", "text": "Integer overflow in Mozilla Firefox and Thunderbird before 1.5.0.4 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via \"jsstr tagify,\" which leads to memory corruption.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:devhelp-0:0.10-0.2.el4.i386", "4AS:devhelp-0:0.10-0.2.el4.ppc", "4AS:devhelp-0:0.10-0.2.el4.src", "4AS:devhelp-0:0.10-0.2.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.2.el4.i386", "4AS:devhelp-devel-0:0.10-0.2.el4.ppc", "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4AS:seamonkey-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-0:1.0.3-0.el4.1.src", "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4Desktop:devhelp-0:0.10-0.2.el4.i386", "4Desktop:devhelp-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-0:0.10-0.2.el4.src", "4Desktop:devhelp-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-0:1.0.3-0.el4.1.src", "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4ES:devhelp-0:0.10-0.2.el4.i386", "4ES:devhelp-0:0.10-0.2.el4.ppc", "4ES:devhelp-0:0.10-0.2.el4.src", "4ES:devhelp-0:0.10-0.2.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.2.el4.i386", "4ES:devhelp-devel-0:0.10-0.2.el4.ppc", "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64", "4ES:seamonkey-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-0:1.0.3-0.el4.1.src", "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4WS:devhelp-0:0.10-0.2.el4.i386", "4WS:devhelp-0:0.10-0.2.el4.ppc", "4WS:devhelp-0:0.10-0.2.el4.src", "4WS:devhelp-0:0.10-0.2.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.2.el4.i386", "4WS:devhelp-devel-0:0.10-0.2.el4.ppc", "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4WS:seamonkey-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-0:1.0.3-0.el4.1.src", "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2780" }, { "category": "external", "summary": "RHBZ#1618115", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618115" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2780", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2780" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2780", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2780" } ], "release_date": "2006-06-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-08-02T18:39:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nMultilib systems may experience difficulty if trying to specify the package\nby name to the Update Agent via a command line argument. This can be\nsolved by executing the following commands:\n\nup2date seamonkey; up2date seamonkey-nss seamonkey-nspr", "product_ids": [ "4AS:devhelp-0:0.10-0.2.el4.i386", "4AS:devhelp-0:0.10-0.2.el4.ppc", "4AS:devhelp-0:0.10-0.2.el4.src", "4AS:devhelp-0:0.10-0.2.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.2.el4.i386", "4AS:devhelp-devel-0:0.10-0.2.el4.ppc", "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4AS:seamonkey-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-0:1.0.3-0.el4.1.src", "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4Desktop:devhelp-0:0.10-0.2.el4.i386", "4Desktop:devhelp-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-0:0.10-0.2.el4.src", "4Desktop:devhelp-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-0:1.0.3-0.el4.1.src", "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4ES:devhelp-0:0.10-0.2.el4.i386", "4ES:devhelp-0:0.10-0.2.el4.ppc", "4ES:devhelp-0:0.10-0.2.el4.src", "4ES:devhelp-0:0.10-0.2.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.2.el4.i386", "4ES:devhelp-devel-0:0.10-0.2.el4.ppc", "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64", "4ES:seamonkey-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-0:1.0.3-0.el4.1.src", "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4WS:devhelp-0:0.10-0.2.el4.i386", "4WS:devhelp-0:0.10-0.2.el4.ppc", "4WS:devhelp-0:0.10-0.2.el4.src", "4WS:devhelp-0:0.10-0.2.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.2.el4.i386", "4WS:devhelp-devel-0:0.10-0.2.el4.ppc", "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4WS:seamonkey-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-0:1.0.3-0.el4.1.src", "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0609" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-2781", "discovery_date": "2006-06-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "193963" } ], "notes": [ { "category": "description", "text": "Double free vulnerability in nsVCard.cpp in Mozilla Thunderbird before 1.5.0.4 and SeaMonkey before 1.0.2 allows remote attackers to cause a denial of service (hang) and possibly execute arbitrary code via a VCard that contains invalid base64 characters.", "title": "Vulnerability description" }, { "category": "summary", "text": "(seamonkey): DOS/arbitrary code execution vuln with vcards", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:devhelp-0:0.10-0.2.el4.i386", "4AS:devhelp-0:0.10-0.2.el4.ppc", "4AS:devhelp-0:0.10-0.2.el4.src", "4AS:devhelp-0:0.10-0.2.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.2.el4.i386", "4AS:devhelp-devel-0:0.10-0.2.el4.ppc", "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4AS:seamonkey-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-0:1.0.3-0.el4.1.src", "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4Desktop:devhelp-0:0.10-0.2.el4.i386", "4Desktop:devhelp-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-0:0.10-0.2.el4.src", "4Desktop:devhelp-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-0:1.0.3-0.el4.1.src", "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4ES:devhelp-0:0.10-0.2.el4.i386", "4ES:devhelp-0:0.10-0.2.el4.ppc", "4ES:devhelp-0:0.10-0.2.el4.src", "4ES:devhelp-0:0.10-0.2.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.2.el4.i386", "4ES:devhelp-devel-0:0.10-0.2.el4.ppc", "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64", "4ES:seamonkey-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-0:1.0.3-0.el4.1.src", "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4WS:devhelp-0:0.10-0.2.el4.i386", "4WS:devhelp-0:0.10-0.2.el4.ppc", "4WS:devhelp-0:0.10-0.2.el4.src", "4WS:devhelp-0:0.10-0.2.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.2.el4.i386", "4WS:devhelp-devel-0:0.10-0.2.el4.ppc", "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4WS:seamonkey-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-0:1.0.3-0.el4.1.src", "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2781" }, { "category": "external", "summary": "RHBZ#193963", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=193963" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2781", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2781" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2781", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2781" } ], "release_date": "2006-06-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-08-02T18:39:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nMultilib systems may experience difficulty if trying to specify the package\nby name to the Update Agent via a command line argument. This can be\nsolved by executing the following commands:\n\nup2date seamonkey; up2date seamonkey-nss seamonkey-nspr", "product_ids": [ "4AS:devhelp-0:0.10-0.2.el4.i386", "4AS:devhelp-0:0.10-0.2.el4.ppc", "4AS:devhelp-0:0.10-0.2.el4.src", "4AS:devhelp-0:0.10-0.2.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.2.el4.i386", "4AS:devhelp-devel-0:0.10-0.2.el4.ppc", "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4AS:seamonkey-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-0:1.0.3-0.el4.1.src", "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4Desktop:devhelp-0:0.10-0.2.el4.i386", "4Desktop:devhelp-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-0:0.10-0.2.el4.src", "4Desktop:devhelp-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-0:1.0.3-0.el4.1.src", "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4ES:devhelp-0:0.10-0.2.el4.i386", "4ES:devhelp-0:0.10-0.2.el4.ppc", "4ES:devhelp-0:0.10-0.2.el4.src", "4ES:devhelp-0:0.10-0.2.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.2.el4.i386", "4ES:devhelp-devel-0:0.10-0.2.el4.ppc", "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64", "4ES:seamonkey-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-0:1.0.3-0.el4.1.src", "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4WS:devhelp-0:0.10-0.2.el4.i386", "4WS:devhelp-0:0.10-0.2.el4.ppc", "4WS:devhelp-0:0.10-0.2.el4.src", "4WS:devhelp-0:0.10-0.2.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.2.el4.i386", "4WS:devhelp-devel-0:0.10-0.2.el4.ppc", "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4WS:seamonkey-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-0:1.0.3-0.el4.1.src", "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0609" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "(seamonkey): DOS/arbitrary code execution vuln with vcards" }, { "cve": "CVE-2006-2782", "discovery_date": "2006-05-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618116" } ], "notes": [ { "category": "description", "text": "Firefox 1.5.0.2 does not fix all test cases associated with CVE-2006-1729, which allows remote attackers to read arbitrary files by inserting the target filename into a text box, then turning that box into a file upload control.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:devhelp-0:0.10-0.2.el4.i386", "4AS:devhelp-0:0.10-0.2.el4.ppc", "4AS:devhelp-0:0.10-0.2.el4.src", "4AS:devhelp-0:0.10-0.2.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.2.el4.i386", "4AS:devhelp-devel-0:0.10-0.2.el4.ppc", "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4AS:seamonkey-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-0:1.0.3-0.el4.1.src", "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4Desktop:devhelp-0:0.10-0.2.el4.i386", "4Desktop:devhelp-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-0:0.10-0.2.el4.src", "4Desktop:devhelp-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-0:1.0.3-0.el4.1.src", "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4ES:devhelp-0:0.10-0.2.el4.i386", "4ES:devhelp-0:0.10-0.2.el4.ppc", "4ES:devhelp-0:0.10-0.2.el4.src", "4ES:devhelp-0:0.10-0.2.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.2.el4.i386", "4ES:devhelp-devel-0:0.10-0.2.el4.ppc", "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64", "4ES:seamonkey-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-0:1.0.3-0.el4.1.src", "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4WS:devhelp-0:0.10-0.2.el4.i386", "4WS:devhelp-0:0.10-0.2.el4.ppc", "4WS:devhelp-0:0.10-0.2.el4.src", "4WS:devhelp-0:0.10-0.2.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.2.el4.i386", "4WS:devhelp-devel-0:0.10-0.2.el4.ppc", "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4WS:seamonkey-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-0:1.0.3-0.el4.1.src", "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2782" }, { "category": "external", "summary": "RHBZ#1618116", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618116" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2782", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2782" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2782", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2782" } ], "release_date": "2006-06-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-08-02T18:39:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nMultilib systems may experience difficulty if trying to specify the package\nby name to the Update Agent via a command line argument. This can be\nsolved by executing the following commands:\n\nup2date seamonkey; up2date seamonkey-nss seamonkey-nspr", "product_ids": [ "4AS:devhelp-0:0.10-0.2.el4.i386", "4AS:devhelp-0:0.10-0.2.el4.ppc", "4AS:devhelp-0:0.10-0.2.el4.src", "4AS:devhelp-0:0.10-0.2.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.2.el4.i386", "4AS:devhelp-devel-0:0.10-0.2.el4.ppc", "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4AS:seamonkey-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-0:1.0.3-0.el4.1.src", "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4Desktop:devhelp-0:0.10-0.2.el4.i386", "4Desktop:devhelp-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-0:0.10-0.2.el4.src", "4Desktop:devhelp-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-0:1.0.3-0.el4.1.src", "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4ES:devhelp-0:0.10-0.2.el4.i386", "4ES:devhelp-0:0.10-0.2.el4.ppc", "4ES:devhelp-0:0.10-0.2.el4.src", "4ES:devhelp-0:0.10-0.2.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.2.el4.i386", "4ES:devhelp-devel-0:0.10-0.2.el4.ppc", "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64", "4ES:seamonkey-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-0:1.0.3-0.el4.1.src", "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4WS:devhelp-0:0.10-0.2.el4.i386", "4WS:devhelp-0:0.10-0.2.el4.ppc", "4WS:devhelp-0:0.10-0.2.el4.src", "4WS:devhelp-0:0.10-0.2.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.2.el4.i386", "4WS:devhelp-devel-0:0.10-0.2.el4.ppc", "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4WS:seamonkey-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-0:1.0.3-0.el4.1.src", "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0609" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2006-2783", "discovery_date": "2006-05-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618117" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox and Thunderbird before 1.5.0.4 strip the Unicode Byte-order-Mark (BOM) from a UTF-8 page before the page is passed to the parser, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a BOM sequence in the middle of a dangerous tag such as SCRIPT.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:devhelp-0:0.10-0.2.el4.i386", "4AS:devhelp-0:0.10-0.2.el4.ppc", "4AS:devhelp-0:0.10-0.2.el4.src", "4AS:devhelp-0:0.10-0.2.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.2.el4.i386", "4AS:devhelp-devel-0:0.10-0.2.el4.ppc", "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4AS:seamonkey-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-0:1.0.3-0.el4.1.src", "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4Desktop:devhelp-0:0.10-0.2.el4.i386", "4Desktop:devhelp-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-0:0.10-0.2.el4.src", "4Desktop:devhelp-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-0:1.0.3-0.el4.1.src", "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4ES:devhelp-0:0.10-0.2.el4.i386", "4ES:devhelp-0:0.10-0.2.el4.ppc", "4ES:devhelp-0:0.10-0.2.el4.src", "4ES:devhelp-0:0.10-0.2.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.2.el4.i386", "4ES:devhelp-devel-0:0.10-0.2.el4.ppc", "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64", "4ES:seamonkey-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-0:1.0.3-0.el4.1.src", "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4WS:devhelp-0:0.10-0.2.el4.i386", "4WS:devhelp-0:0.10-0.2.el4.ppc", "4WS:devhelp-0:0.10-0.2.el4.src", "4WS:devhelp-0:0.10-0.2.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.2.el4.i386", "4WS:devhelp-devel-0:0.10-0.2.el4.ppc", "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4WS:seamonkey-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-0:1.0.3-0.el4.1.src", "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2783" }, { "category": "external", "summary": "RHBZ#1618117", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618117" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2783", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2783" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2783", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2783" } ], "release_date": "2006-06-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-08-02T18:39:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nMultilib systems may experience difficulty if trying to specify the package\nby name to the Update Agent via a command line argument. This can be\nsolved by executing the following commands:\n\nup2date seamonkey; up2date seamonkey-nss seamonkey-nspr", "product_ids": [ "4AS:devhelp-0:0.10-0.2.el4.i386", "4AS:devhelp-0:0.10-0.2.el4.ppc", "4AS:devhelp-0:0.10-0.2.el4.src", "4AS:devhelp-0:0.10-0.2.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.2.el4.i386", "4AS:devhelp-devel-0:0.10-0.2.el4.ppc", "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4AS:seamonkey-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-0:1.0.3-0.el4.1.src", "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4Desktop:devhelp-0:0.10-0.2.el4.i386", "4Desktop:devhelp-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-0:0.10-0.2.el4.src", "4Desktop:devhelp-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-0:1.0.3-0.el4.1.src", "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4ES:devhelp-0:0.10-0.2.el4.i386", "4ES:devhelp-0:0.10-0.2.el4.ppc", "4ES:devhelp-0:0.10-0.2.el4.src", "4ES:devhelp-0:0.10-0.2.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.2.el4.i386", "4ES:devhelp-devel-0:0.10-0.2.el4.ppc", "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64", "4ES:seamonkey-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-0:1.0.3-0.el4.1.src", "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4WS:devhelp-0:0.10-0.2.el4.i386", "4WS:devhelp-0:0.10-0.2.el4.ppc", "4WS:devhelp-0:0.10-0.2.el4.src", "4WS:devhelp-0:0.10-0.2.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.2.el4.i386", "4WS:devhelp-devel-0:0.10-0.2.el4.ppc", "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4WS:seamonkey-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-0:1.0.3-0.el4.1.src", "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0609" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2006-2784", "discovery_date": "2006-05-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618118" } ], "notes": [ { "category": "description", "text": "The PLUGINSPAGE functionality in Mozilla Firefox before 1.5.0.4 allows remote user-assisted attackers to execute privileged code by tricking a user into installing missing plugins and selecting the \"Manual Install\" button, then using nested javascript: URLs. NOTE: the manual install button is used for downloading software from a remote web site, so this issue would not cross privilege boundaries if the user progresses to the point of installing malicious software from the attacker-controlled site.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:devhelp-0:0.10-0.2.el4.i386", "4AS:devhelp-0:0.10-0.2.el4.ppc", "4AS:devhelp-0:0.10-0.2.el4.src", "4AS:devhelp-0:0.10-0.2.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.2.el4.i386", "4AS:devhelp-devel-0:0.10-0.2.el4.ppc", "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4AS:seamonkey-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-0:1.0.3-0.el4.1.src", "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4Desktop:devhelp-0:0.10-0.2.el4.i386", "4Desktop:devhelp-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-0:0.10-0.2.el4.src", "4Desktop:devhelp-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-0:1.0.3-0.el4.1.src", "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4ES:devhelp-0:0.10-0.2.el4.i386", "4ES:devhelp-0:0.10-0.2.el4.ppc", "4ES:devhelp-0:0.10-0.2.el4.src", "4ES:devhelp-0:0.10-0.2.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.2.el4.i386", "4ES:devhelp-devel-0:0.10-0.2.el4.ppc", "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64", "4ES:seamonkey-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-0:1.0.3-0.el4.1.src", "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4WS:devhelp-0:0.10-0.2.el4.i386", "4WS:devhelp-0:0.10-0.2.el4.ppc", "4WS:devhelp-0:0.10-0.2.el4.src", "4WS:devhelp-0:0.10-0.2.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.2.el4.i386", "4WS:devhelp-devel-0:0.10-0.2.el4.ppc", "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4WS:seamonkey-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-0:1.0.3-0.el4.1.src", "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2784" }, { "category": "external", "summary": "RHBZ#1618118", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618118" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2784", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2784" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2784", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2784" } ], "release_date": "2006-06-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-08-02T18:39:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nMultilib systems may experience difficulty if trying to specify the package\nby name to the Update Agent via a command line argument. This can be\nsolved by executing the following commands:\n\nup2date seamonkey; up2date seamonkey-nss seamonkey-nspr", "product_ids": [ "4AS:devhelp-0:0.10-0.2.el4.i386", "4AS:devhelp-0:0.10-0.2.el4.ppc", "4AS:devhelp-0:0.10-0.2.el4.src", "4AS:devhelp-0:0.10-0.2.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.2.el4.i386", "4AS:devhelp-devel-0:0.10-0.2.el4.ppc", "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4AS:seamonkey-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-0:1.0.3-0.el4.1.src", "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4Desktop:devhelp-0:0.10-0.2.el4.i386", "4Desktop:devhelp-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-0:0.10-0.2.el4.src", "4Desktop:devhelp-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-0:1.0.3-0.el4.1.src", "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4ES:devhelp-0:0.10-0.2.el4.i386", "4ES:devhelp-0:0.10-0.2.el4.ppc", "4ES:devhelp-0:0.10-0.2.el4.src", "4ES:devhelp-0:0.10-0.2.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.2.el4.i386", "4ES:devhelp-devel-0:0.10-0.2.el4.ppc", "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64", "4ES:seamonkey-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-0:1.0.3-0.el4.1.src", "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4WS:devhelp-0:0.10-0.2.el4.i386", "4WS:devhelp-0:0.10-0.2.el4.ppc", "4WS:devhelp-0:0.10-0.2.el4.src", "4WS:devhelp-0:0.10-0.2.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.2.el4.i386", "4WS:devhelp-devel-0:0.10-0.2.el4.ppc", "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4WS:seamonkey-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-0:1.0.3-0.el4.1.src", "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0609" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2006-2785", "discovery_date": "2006-05-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618119" } ], "notes": [ { "category": "description", "text": "Cross-site scripting (XSS) vulnerability in Mozilla Firefox before 1.5.0.4 allows user-assisted remote attackers to inject arbitrary web script or HTML by tricking a user into (1) performing a \"View Image\" on a broken image in which the SRC attribute contains a Javascript URL, or (2) selecting \"Show only this frame\" on a frame whose SRC attribute contains a Javascript URL.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:devhelp-0:0.10-0.2.el4.i386", "4AS:devhelp-0:0.10-0.2.el4.ppc", "4AS:devhelp-0:0.10-0.2.el4.src", "4AS:devhelp-0:0.10-0.2.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.2.el4.i386", "4AS:devhelp-devel-0:0.10-0.2.el4.ppc", "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4AS:seamonkey-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-0:1.0.3-0.el4.1.src", "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4Desktop:devhelp-0:0.10-0.2.el4.i386", "4Desktop:devhelp-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-0:0.10-0.2.el4.src", "4Desktop:devhelp-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-0:1.0.3-0.el4.1.src", "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4ES:devhelp-0:0.10-0.2.el4.i386", "4ES:devhelp-0:0.10-0.2.el4.ppc", "4ES:devhelp-0:0.10-0.2.el4.src", "4ES:devhelp-0:0.10-0.2.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.2.el4.i386", "4ES:devhelp-devel-0:0.10-0.2.el4.ppc", "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64", "4ES:seamonkey-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-0:1.0.3-0.el4.1.src", "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4WS:devhelp-0:0.10-0.2.el4.i386", "4WS:devhelp-0:0.10-0.2.el4.ppc", "4WS:devhelp-0:0.10-0.2.el4.src", "4WS:devhelp-0:0.10-0.2.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.2.el4.i386", "4WS:devhelp-devel-0:0.10-0.2.el4.ppc", "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4WS:seamonkey-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-0:1.0.3-0.el4.1.src", "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2785" }, { "category": "external", "summary": "RHBZ#1618119", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618119" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2785", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2785" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2785", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2785" } ], "release_date": "2006-06-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-08-02T18:39:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nMultilib systems may experience difficulty if trying to specify the package\nby name to the Update Agent via a command line argument. This can be\nsolved by executing the following commands:\n\nup2date seamonkey; up2date seamonkey-nss seamonkey-nspr", "product_ids": [ "4AS:devhelp-0:0.10-0.2.el4.i386", "4AS:devhelp-0:0.10-0.2.el4.ppc", "4AS:devhelp-0:0.10-0.2.el4.src", "4AS:devhelp-0:0.10-0.2.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.2.el4.i386", "4AS:devhelp-devel-0:0.10-0.2.el4.ppc", "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4AS:seamonkey-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-0:1.0.3-0.el4.1.src", "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4Desktop:devhelp-0:0.10-0.2.el4.i386", "4Desktop:devhelp-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-0:0.10-0.2.el4.src", "4Desktop:devhelp-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-0:1.0.3-0.el4.1.src", "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4ES:devhelp-0:0.10-0.2.el4.i386", "4ES:devhelp-0:0.10-0.2.el4.ppc", "4ES:devhelp-0:0.10-0.2.el4.src", "4ES:devhelp-0:0.10-0.2.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.2.el4.i386", "4ES:devhelp-devel-0:0.10-0.2.el4.ppc", "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64", "4ES:seamonkey-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-0:1.0.3-0.el4.1.src", "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4WS:devhelp-0:0.10-0.2.el4.i386", "4WS:devhelp-0:0.10-0.2.el4.ppc", "4WS:devhelp-0:0.10-0.2.el4.src", "4WS:devhelp-0:0.10-0.2.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.2.el4.i386", "4WS:devhelp-devel-0:0.10-0.2.el4.ppc", "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4WS:seamonkey-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-0:1.0.3-0.el4.1.src", "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0609" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2006-2786", "discovery_date": "2006-05-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618120" } ], "notes": [ { "category": "description", "text": "HTTP response smuggling vulnerability in Mozilla Firefox and Thunderbird before 1.5.0.4, when used with certain proxy servers, allows remote attackers to cause Firefox to interpret certain responses as if they were responses from two different sites via (1) invalid HTTP response headers with spaces between the header name and the colon, which might not be ignored in some cases, or (2) HTTP 1.1 headers through an HTTP 1.0 proxy, which are ignored by the proxy but processed by the client.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:devhelp-0:0.10-0.2.el4.i386", "4AS:devhelp-0:0.10-0.2.el4.ppc", "4AS:devhelp-0:0.10-0.2.el4.src", "4AS:devhelp-0:0.10-0.2.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.2.el4.i386", "4AS:devhelp-devel-0:0.10-0.2.el4.ppc", "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4AS:seamonkey-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-0:1.0.3-0.el4.1.src", "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4Desktop:devhelp-0:0.10-0.2.el4.i386", "4Desktop:devhelp-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-0:0.10-0.2.el4.src", "4Desktop:devhelp-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-0:1.0.3-0.el4.1.src", "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4ES:devhelp-0:0.10-0.2.el4.i386", "4ES:devhelp-0:0.10-0.2.el4.ppc", "4ES:devhelp-0:0.10-0.2.el4.src", "4ES:devhelp-0:0.10-0.2.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.2.el4.i386", "4ES:devhelp-devel-0:0.10-0.2.el4.ppc", "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64", "4ES:seamonkey-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-0:1.0.3-0.el4.1.src", "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4WS:devhelp-0:0.10-0.2.el4.i386", "4WS:devhelp-0:0.10-0.2.el4.ppc", "4WS:devhelp-0:0.10-0.2.el4.src", "4WS:devhelp-0:0.10-0.2.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.2.el4.i386", "4WS:devhelp-devel-0:0.10-0.2.el4.ppc", "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4WS:seamonkey-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-0:1.0.3-0.el4.1.src", "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2786" }, { "category": "external", "summary": "RHBZ#1618120", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618120" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2786", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2786" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2786", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2786" } ], "release_date": "2006-06-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-08-02T18:39:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nMultilib systems may experience difficulty if trying to specify the package\nby name to the Update Agent via a command line argument. This can be\nsolved by executing the following commands:\n\nup2date seamonkey; up2date seamonkey-nss seamonkey-nspr", "product_ids": [ "4AS:devhelp-0:0.10-0.2.el4.i386", "4AS:devhelp-0:0.10-0.2.el4.ppc", "4AS:devhelp-0:0.10-0.2.el4.src", "4AS:devhelp-0:0.10-0.2.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.2.el4.i386", "4AS:devhelp-devel-0:0.10-0.2.el4.ppc", "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4AS:seamonkey-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-0:1.0.3-0.el4.1.src", "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4Desktop:devhelp-0:0.10-0.2.el4.i386", "4Desktop:devhelp-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-0:0.10-0.2.el4.src", "4Desktop:devhelp-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-0:1.0.3-0.el4.1.src", "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4ES:devhelp-0:0.10-0.2.el4.i386", "4ES:devhelp-0:0.10-0.2.el4.ppc", "4ES:devhelp-0:0.10-0.2.el4.src", "4ES:devhelp-0:0.10-0.2.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.2.el4.i386", "4ES:devhelp-devel-0:0.10-0.2.el4.ppc", "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64", "4ES:seamonkey-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-0:1.0.3-0.el4.1.src", "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4WS:devhelp-0:0.10-0.2.el4.i386", "4WS:devhelp-0:0.10-0.2.el4.ppc", "4WS:devhelp-0:0.10-0.2.el4.src", "4WS:devhelp-0:0.10-0.2.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.2.el4.i386", "4WS:devhelp-devel-0:0.10-0.2.el4.ppc", "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4WS:seamonkey-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-0:1.0.3-0.el4.1.src", "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0609" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2006-2787", "discovery_date": "2006-05-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618121" } ], "notes": [ { "category": "description", "text": "EvalInSandbox in Mozilla Firefox and Thunderbird before 1.5.0.4 allows remote attackers to gain privileges via javascript that calls the valueOf method on objects that were created outside of the sandbox.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:devhelp-0:0.10-0.2.el4.i386", "4AS:devhelp-0:0.10-0.2.el4.ppc", "4AS:devhelp-0:0.10-0.2.el4.src", "4AS:devhelp-0:0.10-0.2.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.2.el4.i386", "4AS:devhelp-devel-0:0.10-0.2.el4.ppc", "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4AS:seamonkey-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-0:1.0.3-0.el4.1.src", "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4Desktop:devhelp-0:0.10-0.2.el4.i386", "4Desktop:devhelp-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-0:0.10-0.2.el4.src", "4Desktop:devhelp-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-0:1.0.3-0.el4.1.src", "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4ES:devhelp-0:0.10-0.2.el4.i386", "4ES:devhelp-0:0.10-0.2.el4.ppc", "4ES:devhelp-0:0.10-0.2.el4.src", "4ES:devhelp-0:0.10-0.2.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.2.el4.i386", "4ES:devhelp-devel-0:0.10-0.2.el4.ppc", "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64", "4ES:seamonkey-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-0:1.0.3-0.el4.1.src", "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4WS:devhelp-0:0.10-0.2.el4.i386", "4WS:devhelp-0:0.10-0.2.el4.ppc", "4WS:devhelp-0:0.10-0.2.el4.src", "4WS:devhelp-0:0.10-0.2.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.2.el4.i386", "4WS:devhelp-devel-0:0.10-0.2.el4.ppc", "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4WS:seamonkey-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-0:1.0.3-0.el4.1.src", "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2787" }, { "category": "external", "summary": "RHBZ#1618121", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618121" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2787", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2787" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2787", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2787" } ], "release_date": "2006-06-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-08-02T18:39:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nMultilib systems may experience difficulty if trying to specify the package\nby name to the Update Agent via a command line argument. This can be\nsolved by executing the following commands:\n\nup2date seamonkey; up2date seamonkey-nss seamonkey-nspr", "product_ids": [ "4AS:devhelp-0:0.10-0.2.el4.i386", "4AS:devhelp-0:0.10-0.2.el4.ppc", "4AS:devhelp-0:0.10-0.2.el4.src", "4AS:devhelp-0:0.10-0.2.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.2.el4.i386", "4AS:devhelp-devel-0:0.10-0.2.el4.ppc", "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4AS:seamonkey-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-0:1.0.3-0.el4.1.src", "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4Desktop:devhelp-0:0.10-0.2.el4.i386", "4Desktop:devhelp-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-0:0.10-0.2.el4.src", "4Desktop:devhelp-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-0:1.0.3-0.el4.1.src", "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4ES:devhelp-0:0.10-0.2.el4.i386", "4ES:devhelp-0:0.10-0.2.el4.ppc", "4ES:devhelp-0:0.10-0.2.el4.src", "4ES:devhelp-0:0.10-0.2.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.2.el4.i386", "4ES:devhelp-devel-0:0.10-0.2.el4.ppc", "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64", "4ES:seamonkey-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-0:1.0.3-0.el4.1.src", "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4WS:devhelp-0:0.10-0.2.el4.i386", "4WS:devhelp-0:0.10-0.2.el4.ppc", "4WS:devhelp-0:0.10-0.2.el4.src", "4WS:devhelp-0:0.10-0.2.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.2.el4.i386", "4WS:devhelp-devel-0:0.10-0.2.el4.ppc", "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4WS:seamonkey-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-0:1.0.3-0.el4.1.src", "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0609" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2006-2788", "discovery_date": "2006-05-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618122" } ], "notes": [ { "category": "description", "text": "Double free vulnerability in the getRawDER function for nsIX509Cert in Firefox allows remote attackers to cause a denial of service (hang) and possibly execute arbitrary code via certain Javascript code.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:devhelp-0:0.10-0.2.el4.i386", "4AS:devhelp-0:0.10-0.2.el4.ppc", "4AS:devhelp-0:0.10-0.2.el4.src", "4AS:devhelp-0:0.10-0.2.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.2.el4.i386", "4AS:devhelp-devel-0:0.10-0.2.el4.ppc", "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4AS:seamonkey-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-0:1.0.3-0.el4.1.src", "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4Desktop:devhelp-0:0.10-0.2.el4.i386", "4Desktop:devhelp-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-0:0.10-0.2.el4.src", "4Desktop:devhelp-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-0:1.0.3-0.el4.1.src", "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4ES:devhelp-0:0.10-0.2.el4.i386", "4ES:devhelp-0:0.10-0.2.el4.ppc", "4ES:devhelp-0:0.10-0.2.el4.src", "4ES:devhelp-0:0.10-0.2.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.2.el4.i386", "4ES:devhelp-devel-0:0.10-0.2.el4.ppc", "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64", "4ES:seamonkey-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-0:1.0.3-0.el4.1.src", "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4WS:devhelp-0:0.10-0.2.el4.i386", "4WS:devhelp-0:0.10-0.2.el4.ppc", "4WS:devhelp-0:0.10-0.2.el4.src", "4WS:devhelp-0:0.10-0.2.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.2.el4.i386", "4WS:devhelp-devel-0:0.10-0.2.el4.ppc", "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4WS:seamonkey-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-0:1.0.3-0.el4.1.src", "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2788" }, { "category": "external", "summary": "RHBZ#1618122", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618122" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2788", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2788" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2788", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2788" } ], "release_date": "2006-06-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-08-02T18:39:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nMultilib systems may experience difficulty if trying to specify the package\nby name to the Update Agent via a command line argument. This can be\nsolved by executing the following commands:\n\nup2date seamonkey; up2date seamonkey-nss seamonkey-nspr", "product_ids": [ "4AS:devhelp-0:0.10-0.2.el4.i386", "4AS:devhelp-0:0.10-0.2.el4.ppc", "4AS:devhelp-0:0.10-0.2.el4.src", "4AS:devhelp-0:0.10-0.2.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.2.el4.i386", "4AS:devhelp-devel-0:0.10-0.2.el4.ppc", "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4AS:seamonkey-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-0:1.0.3-0.el4.1.src", "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4Desktop:devhelp-0:0.10-0.2.el4.i386", "4Desktop:devhelp-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-0:0.10-0.2.el4.src", "4Desktop:devhelp-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-0:1.0.3-0.el4.1.src", "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4ES:devhelp-0:0.10-0.2.el4.i386", "4ES:devhelp-0:0.10-0.2.el4.ppc", "4ES:devhelp-0:0.10-0.2.el4.src", "4ES:devhelp-0:0.10-0.2.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.2.el4.i386", "4ES:devhelp-devel-0:0.10-0.2.el4.ppc", "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64", "4ES:seamonkey-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-0:1.0.3-0.el4.1.src", "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4WS:devhelp-0:0.10-0.2.el4.i386", "4WS:devhelp-0:0.10-0.2.el4.ppc", "4WS:devhelp-0:0.10-0.2.el4.src", "4WS:devhelp-0:0.10-0.2.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.2.el4.i386", "4WS:devhelp-devel-0:0.10-0.2.el4.ppc", "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4WS:seamonkey-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-0:1.0.3-0.el4.1.src", "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0609" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2006-3113", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618135" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox 1.5 before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via simultaneous XPCOM events, which causes a timer object to be deleted in a way that triggers memory corruption.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:devhelp-0:0.10-0.2.el4.i386", "4AS:devhelp-0:0.10-0.2.el4.ppc", "4AS:devhelp-0:0.10-0.2.el4.src", "4AS:devhelp-0:0.10-0.2.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.2.el4.i386", "4AS:devhelp-devel-0:0.10-0.2.el4.ppc", "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4AS:seamonkey-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-0:1.0.3-0.el4.1.src", "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4Desktop:devhelp-0:0.10-0.2.el4.i386", "4Desktop:devhelp-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-0:0.10-0.2.el4.src", "4Desktop:devhelp-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-0:1.0.3-0.el4.1.src", "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4ES:devhelp-0:0.10-0.2.el4.i386", "4ES:devhelp-0:0.10-0.2.el4.ppc", "4ES:devhelp-0:0.10-0.2.el4.src", "4ES:devhelp-0:0.10-0.2.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.2.el4.i386", "4ES:devhelp-devel-0:0.10-0.2.el4.ppc", "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64", "4ES:seamonkey-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-0:1.0.3-0.el4.1.src", "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4WS:devhelp-0:0.10-0.2.el4.i386", "4WS:devhelp-0:0.10-0.2.el4.ppc", "4WS:devhelp-0:0.10-0.2.el4.src", "4WS:devhelp-0:0.10-0.2.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.2.el4.i386", "4WS:devhelp-devel-0:0.10-0.2.el4.ppc", "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4WS:seamonkey-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-0:1.0.3-0.el4.1.src", "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3113" }, { "category": "external", "summary": "RHBZ#1618135", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618135" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3113", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3113" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3113", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3113" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-08-02T18:39:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nMultilib systems may experience difficulty if trying to specify the package\nby name to the Update Agent via a command line argument. This can be\nsolved by executing the following commands:\n\nup2date seamonkey; up2date seamonkey-nss seamonkey-nspr", "product_ids": [ "4AS:devhelp-0:0.10-0.2.el4.i386", "4AS:devhelp-0:0.10-0.2.el4.ppc", "4AS:devhelp-0:0.10-0.2.el4.src", "4AS:devhelp-0:0.10-0.2.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.2.el4.i386", "4AS:devhelp-devel-0:0.10-0.2.el4.ppc", "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4AS:seamonkey-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-0:1.0.3-0.el4.1.src", "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4Desktop:devhelp-0:0.10-0.2.el4.i386", "4Desktop:devhelp-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-0:0.10-0.2.el4.src", "4Desktop:devhelp-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-0:1.0.3-0.el4.1.src", "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4ES:devhelp-0:0.10-0.2.el4.i386", "4ES:devhelp-0:0.10-0.2.el4.ppc", "4ES:devhelp-0:0.10-0.2.el4.src", "4ES:devhelp-0:0.10-0.2.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.2.el4.i386", "4ES:devhelp-devel-0:0.10-0.2.el4.ppc", "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64", "4ES:seamonkey-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-0:1.0.3-0.el4.1.src", "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4WS:devhelp-0:0.10-0.2.el4.i386", "4WS:devhelp-0:0.10-0.2.el4.ppc", "4WS:devhelp-0:0.10-0.2.el4.src", "4WS:devhelp-0:0.10-0.2.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.2.el4.i386", "4WS:devhelp-devel-0:0.10-0.2.el4.ppc", "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4WS:seamonkey-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-0:1.0.3-0.el4.1.src", "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0609" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-3677", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618153" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox 1.5 before 1.5.0.5 and SeaMonkey before 1.0.3 allows remote attackers to execute arbitrary code by changing certain properties of the window navigator object (window.navigator) that are accessed when Java starts up, which causes a crash that leads to code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:devhelp-0:0.10-0.2.el4.i386", "4AS:devhelp-0:0.10-0.2.el4.ppc", "4AS:devhelp-0:0.10-0.2.el4.src", "4AS:devhelp-0:0.10-0.2.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.2.el4.i386", "4AS:devhelp-devel-0:0.10-0.2.el4.ppc", "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4AS:seamonkey-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-0:1.0.3-0.el4.1.src", "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4Desktop:devhelp-0:0.10-0.2.el4.i386", "4Desktop:devhelp-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-0:0.10-0.2.el4.src", "4Desktop:devhelp-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-0:1.0.3-0.el4.1.src", "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4ES:devhelp-0:0.10-0.2.el4.i386", "4ES:devhelp-0:0.10-0.2.el4.ppc", "4ES:devhelp-0:0.10-0.2.el4.src", "4ES:devhelp-0:0.10-0.2.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.2.el4.i386", "4ES:devhelp-devel-0:0.10-0.2.el4.ppc", "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64", "4ES:seamonkey-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-0:1.0.3-0.el4.1.src", "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4WS:devhelp-0:0.10-0.2.el4.i386", "4WS:devhelp-0:0.10-0.2.el4.ppc", "4WS:devhelp-0:0.10-0.2.el4.src", "4WS:devhelp-0:0.10-0.2.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.2.el4.i386", "4WS:devhelp-devel-0:0.10-0.2.el4.ppc", "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4WS:seamonkey-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-0:1.0.3-0.el4.1.src", "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3677" }, { "category": "external", "summary": "RHBZ#1618153", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618153" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3677", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3677" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3677", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3677" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-08-02T18:39:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nMultilib systems may experience difficulty if trying to specify the package\nby name to the Update Agent via a command line argument. This can be\nsolved by executing the following commands:\n\nup2date seamonkey; up2date seamonkey-nss seamonkey-nspr", "product_ids": [ "4AS:devhelp-0:0.10-0.2.el4.i386", "4AS:devhelp-0:0.10-0.2.el4.ppc", "4AS:devhelp-0:0.10-0.2.el4.src", "4AS:devhelp-0:0.10-0.2.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.2.el4.i386", "4AS:devhelp-devel-0:0.10-0.2.el4.ppc", "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4AS:seamonkey-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-0:1.0.3-0.el4.1.src", "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4Desktop:devhelp-0:0.10-0.2.el4.i386", "4Desktop:devhelp-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-0:0.10-0.2.el4.src", "4Desktop:devhelp-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-0:1.0.3-0.el4.1.src", "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4ES:devhelp-0:0.10-0.2.el4.i386", "4ES:devhelp-0:0.10-0.2.el4.ppc", "4ES:devhelp-0:0.10-0.2.el4.src", "4ES:devhelp-0:0.10-0.2.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.2.el4.i386", "4ES:devhelp-devel-0:0.10-0.2.el4.ppc", "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64", "4ES:seamonkey-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-0:1.0.3-0.el4.1.src", "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4WS:devhelp-0:0.10-0.2.el4.i386", "4WS:devhelp-0:0.10-0.2.el4.ppc", "4WS:devhelp-0:0.10-0.2.el4.src", "4WS:devhelp-0:0.10-0.2.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.2.el4.i386", "4WS:devhelp-devel-0:0.10-0.2.el4.ppc", "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4WS:seamonkey-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-0:1.0.3-0.el4.1.src", "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0609" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-3801", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618161" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox 1.5 before 1.5.0.5 and SeaMonkey before 1.0.3 does not properly clear a JavaScript reference to a frame or window, which leaves a pointer to a deleted object that allows remote attackers to execute arbitrary native code.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:devhelp-0:0.10-0.2.el4.i386", "4AS:devhelp-0:0.10-0.2.el4.ppc", "4AS:devhelp-0:0.10-0.2.el4.src", "4AS:devhelp-0:0.10-0.2.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.2.el4.i386", "4AS:devhelp-devel-0:0.10-0.2.el4.ppc", "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4AS:seamonkey-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-0:1.0.3-0.el4.1.src", "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4Desktop:devhelp-0:0.10-0.2.el4.i386", "4Desktop:devhelp-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-0:0.10-0.2.el4.src", "4Desktop:devhelp-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-0:1.0.3-0.el4.1.src", "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4ES:devhelp-0:0.10-0.2.el4.i386", "4ES:devhelp-0:0.10-0.2.el4.ppc", "4ES:devhelp-0:0.10-0.2.el4.src", "4ES:devhelp-0:0.10-0.2.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.2.el4.i386", "4ES:devhelp-devel-0:0.10-0.2.el4.ppc", "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64", "4ES:seamonkey-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-0:1.0.3-0.el4.1.src", "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4WS:devhelp-0:0.10-0.2.el4.i386", "4WS:devhelp-0:0.10-0.2.el4.ppc", "4WS:devhelp-0:0.10-0.2.el4.src", "4WS:devhelp-0:0.10-0.2.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.2.el4.i386", "4WS:devhelp-devel-0:0.10-0.2.el4.ppc", "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4WS:seamonkey-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-0:1.0.3-0.el4.1.src", "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3801" }, { "category": "external", "summary": "RHBZ#1618161", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618161" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3801", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3801" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3801", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3801" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-08-02T18:39:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nMultilib systems may experience difficulty if trying to specify the package\nby name to the Update Agent via a command line argument. This can be\nsolved by executing the following commands:\n\nup2date seamonkey; up2date seamonkey-nss seamonkey-nspr", "product_ids": [ "4AS:devhelp-0:0.10-0.2.el4.i386", "4AS:devhelp-0:0.10-0.2.el4.ppc", "4AS:devhelp-0:0.10-0.2.el4.src", "4AS:devhelp-0:0.10-0.2.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.2.el4.i386", "4AS:devhelp-devel-0:0.10-0.2.el4.ppc", "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4AS:seamonkey-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-0:1.0.3-0.el4.1.src", "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4Desktop:devhelp-0:0.10-0.2.el4.i386", "4Desktop:devhelp-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-0:0.10-0.2.el4.src", "4Desktop:devhelp-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-0:1.0.3-0.el4.1.src", "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4ES:devhelp-0:0.10-0.2.el4.i386", "4ES:devhelp-0:0.10-0.2.el4.ppc", "4ES:devhelp-0:0.10-0.2.el4.src", "4ES:devhelp-0:0.10-0.2.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.2.el4.i386", "4ES:devhelp-devel-0:0.10-0.2.el4.ppc", "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64", "4ES:seamonkey-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-0:1.0.3-0.el4.1.src", "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4WS:devhelp-0:0.10-0.2.el4.i386", "4WS:devhelp-0:0.10-0.2.el4.ppc", "4WS:devhelp-0:0.10-0.2.el4.src", "4WS:devhelp-0:0.10-0.2.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.2.el4.i386", "4WS:devhelp-devel-0:0.10-0.2.el4.ppc", "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4WS:seamonkey-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-0:1.0.3-0.el4.1.src", "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0609" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-3802", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618162" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to hijack native DOM methods from objects in another domain and conduct cross-site scripting (XSS) attacks using DOM methods of the top-level object.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:devhelp-0:0.10-0.2.el4.i386", "4AS:devhelp-0:0.10-0.2.el4.ppc", "4AS:devhelp-0:0.10-0.2.el4.src", "4AS:devhelp-0:0.10-0.2.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.2.el4.i386", "4AS:devhelp-devel-0:0.10-0.2.el4.ppc", "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4AS:seamonkey-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-0:1.0.3-0.el4.1.src", "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4Desktop:devhelp-0:0.10-0.2.el4.i386", "4Desktop:devhelp-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-0:0.10-0.2.el4.src", "4Desktop:devhelp-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-0:1.0.3-0.el4.1.src", "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4ES:devhelp-0:0.10-0.2.el4.i386", "4ES:devhelp-0:0.10-0.2.el4.ppc", "4ES:devhelp-0:0.10-0.2.el4.src", "4ES:devhelp-0:0.10-0.2.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.2.el4.i386", "4ES:devhelp-devel-0:0.10-0.2.el4.ppc", "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64", "4ES:seamonkey-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-0:1.0.3-0.el4.1.src", "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4WS:devhelp-0:0.10-0.2.el4.i386", "4WS:devhelp-0:0.10-0.2.el4.ppc", "4WS:devhelp-0:0.10-0.2.el4.src", "4WS:devhelp-0:0.10-0.2.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.2.el4.i386", "4WS:devhelp-devel-0:0.10-0.2.el4.ppc", "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4WS:seamonkey-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-0:1.0.3-0.el4.1.src", "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3802" }, { "category": "external", "summary": "RHBZ#1618162", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618162" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3802", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3802" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3802", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3802" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-08-02T18:39:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nMultilib systems may experience difficulty if trying to specify the package\nby name to the Update Agent via a command line argument. This can be\nsolved by executing the following commands:\n\nup2date seamonkey; up2date seamonkey-nss seamonkey-nspr", "product_ids": [ "4AS:devhelp-0:0.10-0.2.el4.i386", "4AS:devhelp-0:0.10-0.2.el4.ppc", "4AS:devhelp-0:0.10-0.2.el4.src", "4AS:devhelp-0:0.10-0.2.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.2.el4.i386", "4AS:devhelp-devel-0:0.10-0.2.el4.ppc", "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4AS:seamonkey-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-0:1.0.3-0.el4.1.src", "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4Desktop:devhelp-0:0.10-0.2.el4.i386", "4Desktop:devhelp-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-0:0.10-0.2.el4.src", "4Desktop:devhelp-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-0:1.0.3-0.el4.1.src", "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4ES:devhelp-0:0.10-0.2.el4.i386", "4ES:devhelp-0:0.10-0.2.el4.ppc", "4ES:devhelp-0:0.10-0.2.el4.src", "4ES:devhelp-0:0.10-0.2.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.2.el4.i386", "4ES:devhelp-devel-0:0.10-0.2.el4.ppc", "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64", "4ES:seamonkey-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-0:1.0.3-0.el4.1.src", "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4WS:devhelp-0:0.10-0.2.el4.i386", "4WS:devhelp-0:0.10-0.2.el4.ppc", "4WS:devhelp-0:0.10-0.2.el4.src", "4WS:devhelp-0:0.10-0.2.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.2.el4.i386", "4WS:devhelp-devel-0:0.10-0.2.el4.ppc", "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4WS:seamonkey-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-0:1.0.3-0.el4.1.src", "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0609" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2006-3803", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618163" } ], "notes": [ { "category": "description", "text": "Race condition in the JavaScript garbage collection in Mozilla Firefox 1.5 before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 might allow remote attackers to execute arbitrary code by causing the garbage collector to delete a temporary variable while it is still being used during the creation of a new Function object.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:devhelp-0:0.10-0.2.el4.i386", "4AS:devhelp-0:0.10-0.2.el4.ppc", "4AS:devhelp-0:0.10-0.2.el4.src", "4AS:devhelp-0:0.10-0.2.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.2.el4.i386", "4AS:devhelp-devel-0:0.10-0.2.el4.ppc", "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4AS:seamonkey-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-0:1.0.3-0.el4.1.src", "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4Desktop:devhelp-0:0.10-0.2.el4.i386", "4Desktop:devhelp-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-0:0.10-0.2.el4.src", "4Desktop:devhelp-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-0:1.0.3-0.el4.1.src", "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4ES:devhelp-0:0.10-0.2.el4.i386", "4ES:devhelp-0:0.10-0.2.el4.ppc", "4ES:devhelp-0:0.10-0.2.el4.src", "4ES:devhelp-0:0.10-0.2.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.2.el4.i386", "4ES:devhelp-devel-0:0.10-0.2.el4.ppc", "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64", "4ES:seamonkey-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-0:1.0.3-0.el4.1.src", "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4WS:devhelp-0:0.10-0.2.el4.i386", "4WS:devhelp-0:0.10-0.2.el4.ppc", "4WS:devhelp-0:0.10-0.2.el4.src", "4WS:devhelp-0:0.10-0.2.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.2.el4.i386", "4WS:devhelp-devel-0:0.10-0.2.el4.ppc", "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4WS:seamonkey-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-0:1.0.3-0.el4.1.src", "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3803" }, { "category": "external", "summary": "RHBZ#1618163", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618163" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3803", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3803" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3803", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3803" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-08-02T18:39:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nMultilib systems may experience difficulty if trying to specify the package\nby name to the Update Agent via a command line argument. This can be\nsolved by executing the following commands:\n\nup2date seamonkey; up2date seamonkey-nss seamonkey-nspr", "product_ids": [ "4AS:devhelp-0:0.10-0.2.el4.i386", "4AS:devhelp-0:0.10-0.2.el4.ppc", "4AS:devhelp-0:0.10-0.2.el4.src", "4AS:devhelp-0:0.10-0.2.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.2.el4.i386", "4AS:devhelp-devel-0:0.10-0.2.el4.ppc", "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4AS:seamonkey-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-0:1.0.3-0.el4.1.src", "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4Desktop:devhelp-0:0.10-0.2.el4.i386", "4Desktop:devhelp-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-0:0.10-0.2.el4.src", "4Desktop:devhelp-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-0:1.0.3-0.el4.1.src", "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4ES:devhelp-0:0.10-0.2.el4.i386", "4ES:devhelp-0:0.10-0.2.el4.ppc", "4ES:devhelp-0:0.10-0.2.el4.src", "4ES:devhelp-0:0.10-0.2.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.2.el4.i386", "4ES:devhelp-devel-0:0.10-0.2.el4.ppc", "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64", "4ES:seamonkey-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-0:1.0.3-0.el4.1.src", "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4WS:devhelp-0:0.10-0.2.el4.i386", "4WS:devhelp-0:0.10-0.2.el4.ppc", "4WS:devhelp-0:0.10-0.2.el4.src", "4WS:devhelp-0:0.10-0.2.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.2.el4.i386", "4WS:devhelp-devel-0:0.10-0.2.el4.ppc", "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4WS:seamonkey-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-0:1.0.3-0.el4.1.src", "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0609" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-3804", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618164" } ], "notes": [ { "category": "description", "text": "Heap-based buffer overflow in Mozilla Thunderbird before 1.5.0.5 and SeaMonkey before 1.0.3 allows remote attackers to cause a denial of service (crash) via a VCard attachment with a malformed base64 field, which copies more data than expected due to an integer underflow.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:devhelp-0:0.10-0.2.el4.i386", "4AS:devhelp-0:0.10-0.2.el4.ppc", "4AS:devhelp-0:0.10-0.2.el4.src", "4AS:devhelp-0:0.10-0.2.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.2.el4.i386", "4AS:devhelp-devel-0:0.10-0.2.el4.ppc", "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4AS:seamonkey-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-0:1.0.3-0.el4.1.src", "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4Desktop:devhelp-0:0.10-0.2.el4.i386", "4Desktop:devhelp-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-0:0.10-0.2.el4.src", "4Desktop:devhelp-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-0:1.0.3-0.el4.1.src", "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4ES:devhelp-0:0.10-0.2.el4.i386", "4ES:devhelp-0:0.10-0.2.el4.ppc", "4ES:devhelp-0:0.10-0.2.el4.src", "4ES:devhelp-0:0.10-0.2.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.2.el4.i386", "4ES:devhelp-devel-0:0.10-0.2.el4.ppc", "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64", "4ES:seamonkey-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-0:1.0.3-0.el4.1.src", "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4WS:devhelp-0:0.10-0.2.el4.i386", "4WS:devhelp-0:0.10-0.2.el4.ppc", "4WS:devhelp-0:0.10-0.2.el4.src", "4WS:devhelp-0:0.10-0.2.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.2.el4.i386", "4WS:devhelp-devel-0:0.10-0.2.el4.ppc", "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4WS:seamonkey-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-0:1.0.3-0.el4.1.src", "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3804" }, { "category": "external", "summary": "RHBZ#1618164", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618164" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3804", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3804" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3804", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3804" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-08-02T18:39:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nMultilib systems may experience difficulty if trying to specify the package\nby name to the Update Agent via a command line argument. This can be\nsolved by executing the following commands:\n\nup2date seamonkey; up2date seamonkey-nss seamonkey-nspr", "product_ids": [ "4AS:devhelp-0:0.10-0.2.el4.i386", "4AS:devhelp-0:0.10-0.2.el4.ppc", "4AS:devhelp-0:0.10-0.2.el4.src", "4AS:devhelp-0:0.10-0.2.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.2.el4.i386", "4AS:devhelp-devel-0:0.10-0.2.el4.ppc", "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4AS:seamonkey-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-0:1.0.3-0.el4.1.src", "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4Desktop:devhelp-0:0.10-0.2.el4.i386", "4Desktop:devhelp-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-0:0.10-0.2.el4.src", "4Desktop:devhelp-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-0:1.0.3-0.el4.1.src", "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4ES:devhelp-0:0.10-0.2.el4.i386", "4ES:devhelp-0:0.10-0.2.el4.ppc", "4ES:devhelp-0:0.10-0.2.el4.src", "4ES:devhelp-0:0.10-0.2.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.2.el4.i386", "4ES:devhelp-devel-0:0.10-0.2.el4.ppc", "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64", "4ES:seamonkey-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-0:1.0.3-0.el4.1.src", "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4WS:devhelp-0:0.10-0.2.el4.i386", "4WS:devhelp-0:0.10-0.2.el4.ppc", "4WS:devhelp-0:0.10-0.2.el4.src", "4WS:devhelp-0:0.10-0.2.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.2.el4.i386", "4WS:devhelp-devel-0:0.10-0.2.el4.ppc", "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4WS:seamonkey-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-0:1.0.3-0.el4.1.src", "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0609" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-3805", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618165" } ], "notes": [ { "category": "description", "text": "The Javascript engine in Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 might allow remote attackers to execute arbitrary code via vectors involving garbage collection that causes deletion of a temporary object that is still being used.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:devhelp-0:0.10-0.2.el4.i386", "4AS:devhelp-0:0.10-0.2.el4.ppc", "4AS:devhelp-0:0.10-0.2.el4.src", "4AS:devhelp-0:0.10-0.2.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.2.el4.i386", "4AS:devhelp-devel-0:0.10-0.2.el4.ppc", "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4AS:seamonkey-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-0:1.0.3-0.el4.1.src", "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4Desktop:devhelp-0:0.10-0.2.el4.i386", "4Desktop:devhelp-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-0:0.10-0.2.el4.src", "4Desktop:devhelp-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-0:1.0.3-0.el4.1.src", "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4ES:devhelp-0:0.10-0.2.el4.i386", "4ES:devhelp-0:0.10-0.2.el4.ppc", "4ES:devhelp-0:0.10-0.2.el4.src", "4ES:devhelp-0:0.10-0.2.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.2.el4.i386", "4ES:devhelp-devel-0:0.10-0.2.el4.ppc", "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64", "4ES:seamonkey-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-0:1.0.3-0.el4.1.src", "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4WS:devhelp-0:0.10-0.2.el4.i386", "4WS:devhelp-0:0.10-0.2.el4.ppc", "4WS:devhelp-0:0.10-0.2.el4.src", "4WS:devhelp-0:0.10-0.2.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.2.el4.i386", "4WS:devhelp-devel-0:0.10-0.2.el4.ppc", "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4WS:seamonkey-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-0:1.0.3-0.el4.1.src", "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3805" }, { "category": "external", "summary": "RHBZ#1618165", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618165" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3805", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3805" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3805", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3805" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-08-02T18:39:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nMultilib systems may experience difficulty if trying to specify the package\nby name to the Update Agent via a command line argument. This can be\nsolved by executing the following commands:\n\nup2date seamonkey; up2date seamonkey-nss seamonkey-nspr", "product_ids": [ "4AS:devhelp-0:0.10-0.2.el4.i386", "4AS:devhelp-0:0.10-0.2.el4.ppc", "4AS:devhelp-0:0.10-0.2.el4.src", "4AS:devhelp-0:0.10-0.2.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.2.el4.i386", "4AS:devhelp-devel-0:0.10-0.2.el4.ppc", "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4AS:seamonkey-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-0:1.0.3-0.el4.1.src", "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4Desktop:devhelp-0:0.10-0.2.el4.i386", "4Desktop:devhelp-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-0:0.10-0.2.el4.src", "4Desktop:devhelp-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-0:1.0.3-0.el4.1.src", "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4ES:devhelp-0:0.10-0.2.el4.i386", "4ES:devhelp-0:0.10-0.2.el4.ppc", "4ES:devhelp-0:0.10-0.2.el4.src", "4ES:devhelp-0:0.10-0.2.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.2.el4.i386", "4ES:devhelp-devel-0:0.10-0.2.el4.ppc", "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64", "4ES:seamonkey-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-0:1.0.3-0.el4.1.src", "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4WS:devhelp-0:0.10-0.2.el4.i386", "4WS:devhelp-0:0.10-0.2.el4.ppc", "4WS:devhelp-0:0.10-0.2.el4.src", "4WS:devhelp-0:0.10-0.2.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.2.el4.i386", "4WS:devhelp-devel-0:0.10-0.2.el4.ppc", "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4WS:seamonkey-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-0:1.0.3-0.el4.1.src", "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0609" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-3806", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618166" } ], "notes": [ { "category": "description", "text": "Multiple integer overflows in the Javascript engine in Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 might allow remote attackers to execute arbitrary code via vectors involving (1) long strings in the toSource method of the Object, Array, and String objects; and (2) unspecified \"string function arguments.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:devhelp-0:0.10-0.2.el4.i386", "4AS:devhelp-0:0.10-0.2.el4.ppc", "4AS:devhelp-0:0.10-0.2.el4.src", "4AS:devhelp-0:0.10-0.2.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.2.el4.i386", "4AS:devhelp-devel-0:0.10-0.2.el4.ppc", "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4AS:seamonkey-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-0:1.0.3-0.el4.1.src", "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4Desktop:devhelp-0:0.10-0.2.el4.i386", "4Desktop:devhelp-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-0:0.10-0.2.el4.src", "4Desktop:devhelp-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-0:1.0.3-0.el4.1.src", "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4ES:devhelp-0:0.10-0.2.el4.i386", "4ES:devhelp-0:0.10-0.2.el4.ppc", "4ES:devhelp-0:0.10-0.2.el4.src", "4ES:devhelp-0:0.10-0.2.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.2.el4.i386", "4ES:devhelp-devel-0:0.10-0.2.el4.ppc", "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64", "4ES:seamonkey-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-0:1.0.3-0.el4.1.src", "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4WS:devhelp-0:0.10-0.2.el4.i386", "4WS:devhelp-0:0.10-0.2.el4.ppc", "4WS:devhelp-0:0.10-0.2.el4.src", "4WS:devhelp-0:0.10-0.2.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.2.el4.i386", "4WS:devhelp-devel-0:0.10-0.2.el4.ppc", "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4WS:seamonkey-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-0:1.0.3-0.el4.1.src", "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3806" }, { "category": "external", "summary": "RHBZ#1618166", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618166" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3806", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3806" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3806", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3806" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-08-02T18:39:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nMultilib systems may experience difficulty if trying to specify the package\nby name to the Update Agent via a command line argument. This can be\nsolved by executing the following commands:\n\nup2date seamonkey; up2date seamonkey-nss seamonkey-nspr", "product_ids": [ "4AS:devhelp-0:0.10-0.2.el4.i386", "4AS:devhelp-0:0.10-0.2.el4.ppc", "4AS:devhelp-0:0.10-0.2.el4.src", "4AS:devhelp-0:0.10-0.2.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.2.el4.i386", "4AS:devhelp-devel-0:0.10-0.2.el4.ppc", "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4AS:seamonkey-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-0:1.0.3-0.el4.1.src", "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4Desktop:devhelp-0:0.10-0.2.el4.i386", "4Desktop:devhelp-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-0:0.10-0.2.el4.src", "4Desktop:devhelp-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-0:1.0.3-0.el4.1.src", "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4ES:devhelp-0:0.10-0.2.el4.i386", "4ES:devhelp-0:0.10-0.2.el4.ppc", "4ES:devhelp-0:0.10-0.2.el4.src", "4ES:devhelp-0:0.10-0.2.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.2.el4.i386", "4ES:devhelp-devel-0:0.10-0.2.el4.ppc", "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64", "4ES:seamonkey-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-0:1.0.3-0.el4.1.src", "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4WS:devhelp-0:0.10-0.2.el4.i386", "4WS:devhelp-0:0.10-0.2.el4.ppc", "4WS:devhelp-0:0.10-0.2.el4.src", "4WS:devhelp-0:0.10-0.2.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.2.el4.i386", "4WS:devhelp-devel-0:0.10-0.2.el4.ppc", "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4WS:seamonkey-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-0:1.0.3-0.el4.1.src", "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0609" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-3807", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618167" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to execute arbitrary code via script that changes the standard Object() constructor to return a reference to a privileged object and calling \"named JavaScript functions\" that use the constructor.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:devhelp-0:0.10-0.2.el4.i386", "4AS:devhelp-0:0.10-0.2.el4.ppc", "4AS:devhelp-0:0.10-0.2.el4.src", "4AS:devhelp-0:0.10-0.2.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.2.el4.i386", "4AS:devhelp-devel-0:0.10-0.2.el4.ppc", "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4AS:seamonkey-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-0:1.0.3-0.el4.1.src", "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4Desktop:devhelp-0:0.10-0.2.el4.i386", "4Desktop:devhelp-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-0:0.10-0.2.el4.src", "4Desktop:devhelp-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-0:1.0.3-0.el4.1.src", "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4ES:devhelp-0:0.10-0.2.el4.i386", "4ES:devhelp-0:0.10-0.2.el4.ppc", "4ES:devhelp-0:0.10-0.2.el4.src", "4ES:devhelp-0:0.10-0.2.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.2.el4.i386", "4ES:devhelp-devel-0:0.10-0.2.el4.ppc", "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64", "4ES:seamonkey-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-0:1.0.3-0.el4.1.src", "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4WS:devhelp-0:0.10-0.2.el4.i386", "4WS:devhelp-0:0.10-0.2.el4.ppc", "4WS:devhelp-0:0.10-0.2.el4.src", "4WS:devhelp-0:0.10-0.2.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.2.el4.i386", "4WS:devhelp-devel-0:0.10-0.2.el4.ppc", "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4WS:seamonkey-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-0:1.0.3-0.el4.1.src", "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3807" }, { "category": "external", "summary": "RHBZ#1618167", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618167" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3807", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3807" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3807", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3807" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-08-02T18:39:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nMultilib systems may experience difficulty if trying to specify the package\nby name to the Update Agent via a command line argument. This can be\nsolved by executing the following commands:\n\nup2date seamonkey; up2date seamonkey-nss seamonkey-nspr", "product_ids": [ "4AS:devhelp-0:0.10-0.2.el4.i386", "4AS:devhelp-0:0.10-0.2.el4.ppc", "4AS:devhelp-0:0.10-0.2.el4.src", "4AS:devhelp-0:0.10-0.2.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.2.el4.i386", "4AS:devhelp-devel-0:0.10-0.2.el4.ppc", "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4AS:seamonkey-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-0:1.0.3-0.el4.1.src", "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4Desktop:devhelp-0:0.10-0.2.el4.i386", "4Desktop:devhelp-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-0:0.10-0.2.el4.src", "4Desktop:devhelp-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-0:1.0.3-0.el4.1.src", "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4ES:devhelp-0:0.10-0.2.el4.i386", "4ES:devhelp-0:0.10-0.2.el4.ppc", "4ES:devhelp-0:0.10-0.2.el4.src", "4ES:devhelp-0:0.10-0.2.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.2.el4.i386", "4ES:devhelp-devel-0:0.10-0.2.el4.ppc", "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64", "4ES:seamonkey-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-0:1.0.3-0.el4.1.src", "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4WS:devhelp-0:0.10-0.2.el4.i386", "4WS:devhelp-0:0.10-0.2.el4.ppc", "4WS:devhelp-0:0.10-0.2.el4.src", "4WS:devhelp-0:0.10-0.2.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.2.el4.i386", "4WS:devhelp-devel-0:0.10-0.2.el4.ppc", "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4WS:seamonkey-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-0:1.0.3-0.el4.1.src", "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0609" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-3808", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618168" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox before 1.5.0.5 and SeaMonkey before 1.0.3 allows remote Proxy AutoConfig (PAC) servers to execute code with elevated privileges via a PAC script that sets the FindProxyForURL function to an eval method on a privileged object.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:devhelp-0:0.10-0.2.el4.i386", "4AS:devhelp-0:0.10-0.2.el4.ppc", "4AS:devhelp-0:0.10-0.2.el4.src", "4AS:devhelp-0:0.10-0.2.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.2.el4.i386", "4AS:devhelp-devel-0:0.10-0.2.el4.ppc", "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4AS:seamonkey-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-0:1.0.3-0.el4.1.src", "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4Desktop:devhelp-0:0.10-0.2.el4.i386", "4Desktop:devhelp-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-0:0.10-0.2.el4.src", "4Desktop:devhelp-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-0:1.0.3-0.el4.1.src", "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4ES:devhelp-0:0.10-0.2.el4.i386", "4ES:devhelp-0:0.10-0.2.el4.ppc", "4ES:devhelp-0:0.10-0.2.el4.src", "4ES:devhelp-0:0.10-0.2.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.2.el4.i386", "4ES:devhelp-devel-0:0.10-0.2.el4.ppc", "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64", "4ES:seamonkey-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-0:1.0.3-0.el4.1.src", "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4WS:devhelp-0:0.10-0.2.el4.i386", "4WS:devhelp-0:0.10-0.2.el4.ppc", "4WS:devhelp-0:0.10-0.2.el4.src", "4WS:devhelp-0:0.10-0.2.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.2.el4.i386", "4WS:devhelp-devel-0:0.10-0.2.el4.ppc", "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4WS:seamonkey-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-0:1.0.3-0.el4.1.src", "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3808" }, { "category": "external", "summary": "RHBZ#1618168", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618168" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3808", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3808" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3808", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3808" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-08-02T18:39:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nMultilib systems may experience difficulty if trying to specify the package\nby name to the Update Agent via a command line argument. This can be\nsolved by executing the following commands:\n\nup2date seamonkey; up2date seamonkey-nss seamonkey-nspr", "product_ids": [ "4AS:devhelp-0:0.10-0.2.el4.i386", "4AS:devhelp-0:0.10-0.2.el4.ppc", "4AS:devhelp-0:0.10-0.2.el4.src", "4AS:devhelp-0:0.10-0.2.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.2.el4.i386", "4AS:devhelp-devel-0:0.10-0.2.el4.ppc", "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4AS:seamonkey-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-0:1.0.3-0.el4.1.src", "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4Desktop:devhelp-0:0.10-0.2.el4.i386", "4Desktop:devhelp-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-0:0.10-0.2.el4.src", "4Desktop:devhelp-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-0:1.0.3-0.el4.1.src", "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4ES:devhelp-0:0.10-0.2.el4.i386", "4ES:devhelp-0:0.10-0.2.el4.ppc", "4ES:devhelp-0:0.10-0.2.el4.src", "4ES:devhelp-0:0.10-0.2.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.2.el4.i386", "4ES:devhelp-devel-0:0.10-0.2.el4.ppc", "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64", "4ES:seamonkey-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-0:1.0.3-0.el4.1.src", "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4WS:devhelp-0:0.10-0.2.el4.i386", "4WS:devhelp-0:0.10-0.2.el4.ppc", "4WS:devhelp-0:0.10-0.2.el4.src", "4WS:devhelp-0:0.10-0.2.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.2.el4.i386", "4WS:devhelp-devel-0:0.10-0.2.el4.ppc", "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4WS:seamonkey-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-0:1.0.3-0.el4.1.src", "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0609" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2006-3809", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618169" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows scripts with the UniversalBrowserRead privilege to gain UniversalXPConnect privileges and possibly execute code or obtain sensitive data by reading into a privileged context.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:devhelp-0:0.10-0.2.el4.i386", "4AS:devhelp-0:0.10-0.2.el4.ppc", "4AS:devhelp-0:0.10-0.2.el4.src", "4AS:devhelp-0:0.10-0.2.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.2.el4.i386", "4AS:devhelp-devel-0:0.10-0.2.el4.ppc", "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4AS:seamonkey-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-0:1.0.3-0.el4.1.src", "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4Desktop:devhelp-0:0.10-0.2.el4.i386", "4Desktop:devhelp-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-0:0.10-0.2.el4.src", "4Desktop:devhelp-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-0:1.0.3-0.el4.1.src", "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4ES:devhelp-0:0.10-0.2.el4.i386", "4ES:devhelp-0:0.10-0.2.el4.ppc", "4ES:devhelp-0:0.10-0.2.el4.src", "4ES:devhelp-0:0.10-0.2.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.2.el4.i386", "4ES:devhelp-devel-0:0.10-0.2.el4.ppc", "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64", "4ES:seamonkey-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-0:1.0.3-0.el4.1.src", "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4WS:devhelp-0:0.10-0.2.el4.i386", "4WS:devhelp-0:0.10-0.2.el4.ppc", "4WS:devhelp-0:0.10-0.2.el4.src", "4WS:devhelp-0:0.10-0.2.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.2.el4.i386", "4WS:devhelp-devel-0:0.10-0.2.el4.ppc", "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4WS:seamonkey-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-0:1.0.3-0.el4.1.src", "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3809" }, { "category": "external", "summary": "RHBZ#1618169", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618169" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3809", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3809" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3809", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3809" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-08-02T18:39:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nMultilib systems may experience difficulty if trying to specify the package\nby name to the Update Agent via a command line argument. This can be\nsolved by executing the following commands:\n\nup2date seamonkey; up2date seamonkey-nss seamonkey-nspr", "product_ids": [ "4AS:devhelp-0:0.10-0.2.el4.i386", "4AS:devhelp-0:0.10-0.2.el4.ppc", "4AS:devhelp-0:0.10-0.2.el4.src", "4AS:devhelp-0:0.10-0.2.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.2.el4.i386", "4AS:devhelp-devel-0:0.10-0.2.el4.ppc", "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4AS:seamonkey-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-0:1.0.3-0.el4.1.src", "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4Desktop:devhelp-0:0.10-0.2.el4.i386", "4Desktop:devhelp-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-0:0.10-0.2.el4.src", "4Desktop:devhelp-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-0:1.0.3-0.el4.1.src", "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4ES:devhelp-0:0.10-0.2.el4.i386", "4ES:devhelp-0:0.10-0.2.el4.ppc", "4ES:devhelp-0:0.10-0.2.el4.src", "4ES:devhelp-0:0.10-0.2.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.2.el4.i386", "4ES:devhelp-devel-0:0.10-0.2.el4.ppc", "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64", "4ES:seamonkey-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-0:1.0.3-0.el4.1.src", "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4WS:devhelp-0:0.10-0.2.el4.i386", "4WS:devhelp-0:0.10-0.2.el4.ppc", "4WS:devhelp-0:0.10-0.2.el4.src", "4WS:devhelp-0:0.10-0.2.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.2.el4.i386", "4WS:devhelp-devel-0:0.10-0.2.el4.ppc", "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4WS:seamonkey-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-0:1.0.3-0.el4.1.src", "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0609" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-3810", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618170" } ], "notes": [ { "category": "description", "text": "Cross-site scripting (XSS) vulnerability in Mozilla Firefox 1.5 before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to inject arbitrary web script or HTML via the XPCNativeWrapper(window).Function construct.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:devhelp-0:0.10-0.2.el4.i386", "4AS:devhelp-0:0.10-0.2.el4.ppc", "4AS:devhelp-0:0.10-0.2.el4.src", "4AS:devhelp-0:0.10-0.2.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.2.el4.i386", "4AS:devhelp-devel-0:0.10-0.2.el4.ppc", "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4AS:seamonkey-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-0:1.0.3-0.el4.1.src", "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4Desktop:devhelp-0:0.10-0.2.el4.i386", "4Desktop:devhelp-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-0:0.10-0.2.el4.src", "4Desktop:devhelp-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-0:1.0.3-0.el4.1.src", "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4ES:devhelp-0:0.10-0.2.el4.i386", "4ES:devhelp-0:0.10-0.2.el4.ppc", "4ES:devhelp-0:0.10-0.2.el4.src", "4ES:devhelp-0:0.10-0.2.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.2.el4.i386", "4ES:devhelp-devel-0:0.10-0.2.el4.ppc", "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64", "4ES:seamonkey-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-0:1.0.3-0.el4.1.src", "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4WS:devhelp-0:0.10-0.2.el4.i386", "4WS:devhelp-0:0.10-0.2.el4.ppc", "4WS:devhelp-0:0.10-0.2.el4.src", "4WS:devhelp-0:0.10-0.2.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.2.el4.i386", "4WS:devhelp-devel-0:0.10-0.2.el4.ppc", "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4WS:seamonkey-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-0:1.0.3-0.el4.1.src", "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3810" }, { "category": "external", "summary": "RHBZ#1618170", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618170" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3810", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3810" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3810", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3810" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-08-02T18:39:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nMultilib systems may experience difficulty if trying to specify the package\nby name to the Update Agent via a command line argument. This can be\nsolved by executing the following commands:\n\nup2date seamonkey; up2date seamonkey-nss seamonkey-nspr", "product_ids": [ "4AS:devhelp-0:0.10-0.2.el4.i386", "4AS:devhelp-0:0.10-0.2.el4.ppc", "4AS:devhelp-0:0.10-0.2.el4.src", "4AS:devhelp-0:0.10-0.2.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.2.el4.i386", "4AS:devhelp-devel-0:0.10-0.2.el4.ppc", "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4AS:seamonkey-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-0:1.0.3-0.el4.1.src", "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4Desktop:devhelp-0:0.10-0.2.el4.i386", "4Desktop:devhelp-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-0:0.10-0.2.el4.src", "4Desktop:devhelp-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-0:1.0.3-0.el4.1.src", "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4ES:devhelp-0:0.10-0.2.el4.i386", "4ES:devhelp-0:0.10-0.2.el4.ppc", "4ES:devhelp-0:0.10-0.2.el4.src", "4ES:devhelp-0:0.10-0.2.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.2.el4.i386", "4ES:devhelp-devel-0:0.10-0.2.el4.ppc", "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64", "4ES:seamonkey-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-0:1.0.3-0.el4.1.src", "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4WS:devhelp-0:0.10-0.2.el4.i386", "4WS:devhelp-0:0.10-0.2.el4.ppc", "4WS:devhelp-0:0.10-0.2.el4.src", "4WS:devhelp-0:0.10-0.2.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.2.el4.i386", "4WS:devhelp-devel-0:0.10-0.2.el4.ppc", "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4WS:seamonkey-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-0:1.0.3-0.el4.1.src", "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0609" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2006-3811", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618171" } ], "notes": [ { "category": "description", "text": "Multiple vulnerabilities in Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via Javascript that leads to memory corruption, including (1) nsListControlFrame::FireMenuItemActiveEvent, (2) buffer overflows in the string class in out-of-memory conditions, (3) table row and column groups, (4) \"anonymous box selectors outside of UA stylesheets,\" (5) stale references to \"removed nodes,\" and (6) running the crypto.generateCRMFRequest callback on deleted context.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:devhelp-0:0.10-0.2.el4.i386", "4AS:devhelp-0:0.10-0.2.el4.ppc", "4AS:devhelp-0:0.10-0.2.el4.src", "4AS:devhelp-0:0.10-0.2.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.2.el4.i386", "4AS:devhelp-devel-0:0.10-0.2.el4.ppc", "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4AS:seamonkey-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-0:1.0.3-0.el4.1.src", "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4Desktop:devhelp-0:0.10-0.2.el4.i386", "4Desktop:devhelp-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-0:0.10-0.2.el4.src", "4Desktop:devhelp-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-0:1.0.3-0.el4.1.src", "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4ES:devhelp-0:0.10-0.2.el4.i386", "4ES:devhelp-0:0.10-0.2.el4.ppc", "4ES:devhelp-0:0.10-0.2.el4.src", "4ES:devhelp-0:0.10-0.2.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.2.el4.i386", "4ES:devhelp-devel-0:0.10-0.2.el4.ppc", "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64", "4ES:seamonkey-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-0:1.0.3-0.el4.1.src", "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4WS:devhelp-0:0.10-0.2.el4.i386", "4WS:devhelp-0:0.10-0.2.el4.ppc", "4WS:devhelp-0:0.10-0.2.el4.src", "4WS:devhelp-0:0.10-0.2.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.2.el4.i386", "4WS:devhelp-devel-0:0.10-0.2.el4.ppc", "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4WS:seamonkey-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-0:1.0.3-0.el4.1.src", "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3811" }, { "category": "external", "summary": "RHBZ#1618171", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618171" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3811", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3811" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3811", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3811" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-08-02T18:39:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nMultilib systems may experience difficulty if trying to specify the package\nby name to the Update Agent via a command line argument. This can be\nsolved by executing the following commands:\n\nup2date seamonkey; up2date seamonkey-nss seamonkey-nspr", "product_ids": [ "4AS:devhelp-0:0.10-0.2.el4.i386", "4AS:devhelp-0:0.10-0.2.el4.ppc", "4AS:devhelp-0:0.10-0.2.el4.src", "4AS:devhelp-0:0.10-0.2.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.2.el4.i386", "4AS:devhelp-devel-0:0.10-0.2.el4.ppc", "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4AS:seamonkey-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-0:1.0.3-0.el4.1.src", "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4Desktop:devhelp-0:0.10-0.2.el4.i386", "4Desktop:devhelp-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-0:0.10-0.2.el4.src", "4Desktop:devhelp-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-0:1.0.3-0.el4.1.src", "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4ES:devhelp-0:0.10-0.2.el4.i386", "4ES:devhelp-0:0.10-0.2.el4.ppc", "4ES:devhelp-0:0.10-0.2.el4.src", "4ES:devhelp-0:0.10-0.2.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.2.el4.i386", "4ES:devhelp-devel-0:0.10-0.2.el4.ppc", "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64", "4ES:seamonkey-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-0:1.0.3-0.el4.1.src", "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4WS:devhelp-0:0.10-0.2.el4.i386", "4WS:devhelp-0:0.10-0.2.el4.ppc", "4WS:devhelp-0:0.10-0.2.el4.src", "4WS:devhelp-0:0.10-0.2.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.2.el4.i386", "4WS:devhelp-devel-0:0.10-0.2.el4.ppc", "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4WS:seamonkey-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-0:1.0.3-0.el4.1.src", "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0609" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-3812", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "200455" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to reference remote files and possibly load chrome: URLs by tricking the user into copying or dragging links.", "title": "Vulnerability description" }, { "category": "summary", "text": "vulnerabilities: CVE-2006-{3113,3677,3801-3812}", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:devhelp-0:0.10-0.2.el4.i386", "4AS:devhelp-0:0.10-0.2.el4.ppc", "4AS:devhelp-0:0.10-0.2.el4.src", "4AS:devhelp-0:0.10-0.2.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.2.el4.i386", "4AS:devhelp-devel-0:0.10-0.2.el4.ppc", "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4AS:seamonkey-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-0:1.0.3-0.el4.1.src", "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4Desktop:devhelp-0:0.10-0.2.el4.i386", "4Desktop:devhelp-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-0:0.10-0.2.el4.src", "4Desktop:devhelp-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-0:1.0.3-0.el4.1.src", "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4ES:devhelp-0:0.10-0.2.el4.i386", "4ES:devhelp-0:0.10-0.2.el4.ppc", "4ES:devhelp-0:0.10-0.2.el4.src", "4ES:devhelp-0:0.10-0.2.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.2.el4.i386", "4ES:devhelp-devel-0:0.10-0.2.el4.ppc", "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64", "4ES:seamonkey-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-0:1.0.3-0.el4.1.src", "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4WS:devhelp-0:0.10-0.2.el4.i386", "4WS:devhelp-0:0.10-0.2.el4.ppc", "4WS:devhelp-0:0.10-0.2.el4.src", "4WS:devhelp-0:0.10-0.2.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.2.el4.i386", "4WS:devhelp-devel-0:0.10-0.2.el4.ppc", "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4WS:seamonkey-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-0:1.0.3-0.el4.1.src", "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3812" }, { "category": "external", "summary": "RHBZ#200455", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=200455" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3812", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3812" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3812", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3812" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-08-02T18:39:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nMultilib systems may experience difficulty if trying to specify the package\nby name to the Update Agent via a command line argument. This can be\nsolved by executing the following commands:\n\nup2date seamonkey; up2date seamonkey-nss seamonkey-nspr", "product_ids": [ "4AS:devhelp-0:0.10-0.2.el4.i386", "4AS:devhelp-0:0.10-0.2.el4.ppc", "4AS:devhelp-0:0.10-0.2.el4.src", "4AS:devhelp-0:0.10-0.2.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.2.el4.i386", "4AS:devhelp-devel-0:0.10-0.2.el4.ppc", "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4AS:seamonkey-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-0:1.0.3-0.el4.1.src", "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4Desktop:devhelp-0:0.10-0.2.el4.i386", "4Desktop:devhelp-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-0:0.10-0.2.el4.src", "4Desktop:devhelp-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-0:1.0.3-0.el4.1.src", "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4ES:devhelp-0:0.10-0.2.el4.i386", "4ES:devhelp-0:0.10-0.2.el4.ppc", "4ES:devhelp-0:0.10-0.2.el4.src", "4ES:devhelp-0:0.10-0.2.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.2.el4.i386", "4ES:devhelp-devel-0:0.10-0.2.el4.ppc", "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64", "4ES:seamonkey-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-0:1.0.3-0.el4.1.src", "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4WS:devhelp-0:0.10-0.2.el4.i386", "4WS:devhelp-0:0.10-0.2.el4.ppc", "4WS:devhelp-0:0.10-0.2.el4.src", "4WS:devhelp-0:0.10-0.2.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.2.el4.i386", "4WS:devhelp-devel-0:0.10-0.2.el4.ppc", "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4WS:seamonkey-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-0:1.0.3-0.el4.1.src", "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0609" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "vulnerabilities: CVE-2006-{3113,3677,3801-3812}" } ] }
RHSA-2006:0611
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated thunderbird packages that fix several security bugs are now\navailable for Red Hat Enterprise Linux 4.\n\nThis update has been rated as having critical security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "Mozilla Thunderbird is a standalone mail and newsgroup client.\n\nThe Mozilla Foundation has discontinued support for the Mozilla Thunderbird\n1.0 branch. This update deprecates the Mozilla Thunderbird 1.0 branch in\nRed Hat Enterprise Linux 4 in favor of the supported Mozilla Thunderbird\n1.5 branch.\n\nThis update also resolves a number of outstanding Thunderbird security issues:\n\nSeveral flaws were found in the way Thunderbird processed certain\njavascript actions. A malicious mail message could execute arbitrary\njavascript instructions with the permissions of \"chrome\", allowing the page\nto steal sensitive information or install browser malware. (CVE-2006-2776,\nCVE-2006-2784, CVE-2006-2785, CVE-2006-2787, CVE-2006-3807, CVE-2006-3809)\n\nSeveral denial of service flaws were found in the way Thunderbird processed\ncertain mail messages. A malicious web page could crash the browser or\npossibly execute arbitrary code as the user running Thunderbird.\n(CVE-2006-2779, CVE-2006-2780, CVE-2006-3801, CVE-2006-3677,\nCVE-2006-3113, CVE-2006-3803, CVE-2006-3805, CVE-2006-3806, CVE-2006-3811)\n\nSeveral flaws were found in the way Thunderbird processed certain\njavascript actions. A malicious mail message could conduct a cross-site\nscripting attack or steal sensitive information (such as cookies owned by\nother domains). (CVE-2006-3802, CVE-2006-3810)\n\nA form file upload flaw was found in the way Thunderbird handled javascript\ninput object mutation. A malicious mail message could upload an arbitrary\nlocal file at form submission time without user interaction. (CVE-2006-2782)\n\nA denial of service flaw was found in the way Thunderbird called the\ncrypto.signText() javascript function. A malicious mail message could crash\nthe browser if the victim had a client certificate loaded. (CVE-2006-2778)\n\nA flaw was found in the way Thunderbird processed Proxy AutoConfig scripts.\nA malicious Proxy AutoConfig server could execute arbitrary javascript\ninstructions with the permissions of \"chrome\", allowing the page to steal\nsensitive information or install client malware. (CVE-2006-3808)\n\nNote: Please note that JavaScript support is disabled by default in\nThunderbird. The above issues are not exploitable with JavaScript disabled. \n\nTwo flaws were found in the way Thunderbird displayed malformed inline\nvcard attachments. If a victim viewed an email message containing a\ncarefully crafted vcard it was possible to execute arbitrary code as the\nuser running Thunderbird. (CVE-2006-2781, CVE-2006-3804)\n\nA cross site scripting flaw was found in the way Thunderbird processed\nUnicode Byte-order-Mark (BOM) markers in UTF-8 mail messages. A malicious\nweb page could execute a script within the browser that a web input\nsanitizer could miss due to a malformed \"script\" tag. (CVE-2006-2783)\n\nTwo HTTP response smuggling flaws were found in the way Thunderbird\nprocessed certain invalid HTTP response headers. A malicious web site could\nreturn specially crafted HTTP response headers which may bypass HTTP proxy\nrestrictions. (CVE-2006-2786)\n\nA double free flaw was found in the way the nsIX509::getRawDER method was\ncalled. If a victim visited a carefully crafted web page, it was possible\nto crash Thunderbird. (CVE-2006-2788)\n\nUsers of Thunderbird are advised to upgrade to this update, which contains\nThunderbird version 1.5.0.5 that corrects these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2006:0611", "url": "https://access.redhat.com/errata/RHSA-2006:0611" }, { "category": "external", "summary": "http://www.redhat.com/security/updates/classification/#critical", "url": "http://www.redhat.com/security/updates/classification/#critical" }, { "category": "external", "summary": "197078", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=197078" }, { "category": "external", "summary": "200171", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=200171" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2006/rhsa-2006_0611.json" } ], "title": "Red Hat Security Advisory: thunderbird security update", "tracking": { "current_release_date": "2025-09-10T13:38:42+00:00", "generator": { "date": "2025-09-10T13:38:42+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.7" } }, "id": "RHSA-2006:0611", "initial_release_date": "2006-07-29T00:16:00+00:00", "revision_history": [ { "date": "2006-07-29T00:16:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2006-07-28T00:00:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-09-10T13:38:42+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 4", "product": { "name": "Red Hat Enterprise Linux AS version 4", "product_id": "4AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::as" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop version 4", "product": { "name": "Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 4", "product": { "name": "Red Hat Enterprise Linux ES version 4", "product_id": "4ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 4", "product": { "name": "Red Hat Enterprise Linux WS version 4", "product_id": "4WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::ws" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "thunderbird-0:1.5.0.5-0.el4.1.ia64", "product": { "name": "thunderbird-0:1.5.0.5-0.el4.1.ia64", "product_id": "thunderbird-0:1.5.0.5-0.el4.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird@1.5.0.5-0.el4.1?arch=ia64" } } }, { "category": "product_version", "name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "product": { "name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "product_id": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird-debuginfo@1.5.0.5-0.el4.1?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "thunderbird-0:1.5.0.5-0.el4.1.src", "product": { "name": "thunderbird-0:1.5.0.5-0.el4.1.src", "product_id": "thunderbird-0:1.5.0.5-0.el4.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird@1.5.0.5-0.el4.1?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "thunderbird-0:1.5.0.5-0.el4.1.x86_64", "product": { "name": "thunderbird-0:1.5.0.5-0.el4.1.x86_64", "product_id": "thunderbird-0:1.5.0.5-0.el4.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird@1.5.0.5-0.el4.1?arch=x86_64" } } }, { "category": "product_version", "name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "product": { "name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "product_id": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird-debuginfo@1.5.0.5-0.el4.1?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "thunderbird-0:1.5.0.5-0.el4.1.i386", "product": { "name": "thunderbird-0:1.5.0.5-0.el4.1.i386", "product_id": "thunderbird-0:1.5.0.5-0.el4.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird@1.5.0.5-0.el4.1?arch=i386" } } }, { "category": "product_version", "name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "product": { "name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "product_id": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird-debuginfo@1.5.0.5-0.el4.1?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "thunderbird-0:1.5.0.5-0.el4.1.ppc", "product": { "name": "thunderbird-0:1.5.0.5-0.el4.1.ppc", "product_id": "thunderbird-0:1.5.0.5-0.el4.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird@1.5.0.5-0.el4.1?arch=ppc" } } }, { "category": "product_version", "name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "product": { "name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "product_id": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird-debuginfo@1.5.0.5-0.el4.1?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "thunderbird-0:1.5.0.5-0.el4.1.s390x", "product": { "name": "thunderbird-0:1.5.0.5-0.el4.1.s390x", "product_id": "thunderbird-0:1.5.0.5-0.el4.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird@1.5.0.5-0.el4.1?arch=s390x" } } }, { "category": "product_version", "name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "product": { "name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "product_id": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird-debuginfo@1.5.0.5-0.el4.1?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "thunderbird-0:1.5.0.5-0.el4.1.s390", "product": { "name": "thunderbird-0:1.5.0.5-0.el4.1.s390", "product_id": "thunderbird-0:1.5.0.5-0.el4.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird@1.5.0.5-0.el4.1?arch=s390" } } }, { "category": "product_version", "name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "product": { "name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "product_id": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird-debuginfo@1.5.0.5-0.el4.1?arch=s390" } } } ], "category": "architecture", "name": "s390" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.5-0.el4.1.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:thunderbird-0:1.5.0.5-0.el4.1.i386" }, "product_reference": "thunderbird-0:1.5.0.5-0.el4.1.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.5-0.el4.1.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64" }, "product_reference": "thunderbird-0:1.5.0.5-0.el4.1.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.5-0.el4.1.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc" }, "product_reference": "thunderbird-0:1.5.0.5-0.el4.1.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.5-0.el4.1.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390" }, "product_reference": "thunderbird-0:1.5.0.5-0.el4.1.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.5-0.el4.1.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x" }, "product_reference": "thunderbird-0:1.5.0.5-0.el4.1.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.5-0.el4.1.src as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:thunderbird-0:1.5.0.5-0.el4.1.src" }, "product_reference": "thunderbird-0:1.5.0.5-0.el4.1.src", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.5-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64" }, "product_reference": "thunderbird-0:1.5.0.5-0.el4.1.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386" }, "product_reference": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64" }, "product_reference": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc" }, "product_reference": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390" }, "product_reference": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x" }, "product_reference": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" }, "product_reference": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.5-0.el4.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386" }, "product_reference": "thunderbird-0:1.5.0.5-0.el4.1.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.5-0.el4.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64" }, "product_reference": "thunderbird-0:1.5.0.5-0.el4.1.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.5-0.el4.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc" }, "product_reference": "thunderbird-0:1.5.0.5-0.el4.1.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.5-0.el4.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390" }, "product_reference": "thunderbird-0:1.5.0.5-0.el4.1.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.5-0.el4.1.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x" }, "product_reference": "thunderbird-0:1.5.0.5-0.el4.1.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.5-0.el4.1.src as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src" }, "product_reference": "thunderbird-0:1.5.0.5-0.el4.1.src", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.5-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64" }, "product_reference": "thunderbird-0:1.5.0.5-0.el4.1.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386" }, "product_reference": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64" }, "product_reference": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc" }, "product_reference": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390" }, "product_reference": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x" }, "product_reference": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" }, "product_reference": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.5-0.el4.1.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:thunderbird-0:1.5.0.5-0.el4.1.i386" }, "product_reference": "thunderbird-0:1.5.0.5-0.el4.1.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.5-0.el4.1.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64" }, "product_reference": "thunderbird-0:1.5.0.5-0.el4.1.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.5-0.el4.1.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc" }, "product_reference": "thunderbird-0:1.5.0.5-0.el4.1.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.5-0.el4.1.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390" }, "product_reference": "thunderbird-0:1.5.0.5-0.el4.1.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.5-0.el4.1.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x" }, "product_reference": "thunderbird-0:1.5.0.5-0.el4.1.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.5-0.el4.1.src as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:thunderbird-0:1.5.0.5-0.el4.1.src" }, "product_reference": "thunderbird-0:1.5.0.5-0.el4.1.src", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.5-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64" }, "product_reference": "thunderbird-0:1.5.0.5-0.el4.1.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386" }, "product_reference": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64" }, "product_reference": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc" }, "product_reference": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390" }, "product_reference": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x" }, "product_reference": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" }, "product_reference": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.5-0.el4.1.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:thunderbird-0:1.5.0.5-0.el4.1.i386" }, "product_reference": "thunderbird-0:1.5.0.5-0.el4.1.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.5-0.el4.1.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64" }, "product_reference": "thunderbird-0:1.5.0.5-0.el4.1.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.5-0.el4.1.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc" }, "product_reference": "thunderbird-0:1.5.0.5-0.el4.1.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.5-0.el4.1.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390" }, "product_reference": "thunderbird-0:1.5.0.5-0.el4.1.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.5-0.el4.1.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x" }, "product_reference": "thunderbird-0:1.5.0.5-0.el4.1.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.5-0.el4.1.src as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:thunderbird-0:1.5.0.5-0.el4.1.src" }, "product_reference": "thunderbird-0:1.5.0.5-0.el4.1.src", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.5-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64" }, "product_reference": "thunderbird-0:1.5.0.5-0.el4.1.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386" }, "product_reference": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64" }, "product_reference": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc" }, "product_reference": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390" }, "product_reference": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x" }, "product_reference": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" }, "product_reference": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "relates_to_product_reference": "4WS" } ] }, "vulnerabilities": [ { "cve": "CVE-2006-2776", "discovery_date": "2006-05-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618112" } ], "notes": [ { "category": "description", "text": "Certain privileged UI code in Mozilla Firefox and Thunderbird before 1.5.0.4 calls content-defined setters on an object prototype, which allows remote attackers to execute code at a higher privilege than intended.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-0:1.5.0.5-0.el4.1.src", "4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-0:1.5.0.5-0.el4.1.src", "4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-0:1.5.0.5-0.el4.1.src", "4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2776" }, { "category": "external", "summary": "RHBZ#1618112", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618112" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2776", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2776" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2776", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2776" } ], "release_date": "2006-06-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-29T00:16:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-0:1.5.0.5-0.el4.1.src", "4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-0:1.5.0.5-0.el4.1.src", "4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-0:1.5.0.5-0.el4.1.src", "4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0611" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2006-2778", "discovery_date": "2006-05-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618113" } ], "notes": [ { "category": "description", "text": "The crypto.signText function in Mozilla Firefox and Thunderbird before 1.5.0.4 allows remote attackers to execute arbitrary code via certain optional Certificate Authority name arguments, which causes an invalid array index and triggers a buffer overflow.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-0:1.5.0.5-0.el4.1.src", "4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-0:1.5.0.5-0.el4.1.src", "4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-0:1.5.0.5-0.el4.1.src", "4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2778" }, { "category": "external", "summary": "RHBZ#1618113", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618113" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2778", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2778" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2778", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2778" } ], "release_date": "2006-06-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-29T00:16:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-0:1.5.0.5-0.el4.1.src", "4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-0:1.5.0.5-0.el4.1.src", "4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-0:1.5.0.5-0.el4.1.src", "4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0611" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2006-2779", "discovery_date": "2006-06-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618114" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox and Thunderbird before 1.5.0.4 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via (1) nested \u003coption\u003e tags in a select tag, (2) a DOMNodeRemoved mutation event, (3) \"Content-implemented tree views,\" (4) BoxObjects, (5) the XBL implementation, (6) an iframe that attempts to remove itself, which leads to memory corruption.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-0:1.5.0.5-0.el4.1.src", "4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-0:1.5.0.5-0.el4.1.src", "4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-0:1.5.0.5-0.el4.1.src", "4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2779" }, { "category": "external", "summary": "RHBZ#1618114", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618114" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2779", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2779" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2779", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2779" } ], "release_date": "2006-06-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-29T00:16:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-0:1.5.0.5-0.el4.1.src", "4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-0:1.5.0.5-0.el4.1.src", "4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-0:1.5.0.5-0.el4.1.src", "4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0611" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-2780", "discovery_date": "2006-06-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618115" } ], "notes": [ { "category": "description", "text": "Integer overflow in Mozilla Firefox and Thunderbird before 1.5.0.4 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via \"jsstr tagify,\" which leads to memory corruption.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-0:1.5.0.5-0.el4.1.src", "4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-0:1.5.0.5-0.el4.1.src", "4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-0:1.5.0.5-0.el4.1.src", "4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2780" }, { "category": "external", "summary": "RHBZ#1618115", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618115" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2780", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2780" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2780", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2780" } ], "release_date": "2006-06-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-29T00:16:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-0:1.5.0.5-0.el4.1.src", "4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-0:1.5.0.5-0.el4.1.src", "4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-0:1.5.0.5-0.el4.1.src", "4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0611" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-2781", "discovery_date": "2006-06-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "193963" } ], "notes": [ { "category": "description", "text": "Double free vulnerability in nsVCard.cpp in Mozilla Thunderbird before 1.5.0.4 and SeaMonkey before 1.0.2 allows remote attackers to cause a denial of service (hang) and possibly execute arbitrary code via a VCard that contains invalid base64 characters.", "title": "Vulnerability description" }, { "category": "summary", "text": "(seamonkey): DOS/arbitrary code execution vuln with vcards", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-0:1.5.0.5-0.el4.1.src", "4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-0:1.5.0.5-0.el4.1.src", "4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-0:1.5.0.5-0.el4.1.src", "4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2781" }, { "category": "external", "summary": "RHBZ#193963", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=193963" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2781", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2781" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2781", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2781" } ], "release_date": "2006-06-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-29T00:16:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-0:1.5.0.5-0.el4.1.src", "4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-0:1.5.0.5-0.el4.1.src", "4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-0:1.5.0.5-0.el4.1.src", "4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0611" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "(seamonkey): DOS/arbitrary code execution vuln with vcards" }, { "cve": "CVE-2006-2782", "discovery_date": "2006-05-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618116" } ], "notes": [ { "category": "description", "text": "Firefox 1.5.0.2 does not fix all test cases associated with CVE-2006-1729, which allows remote attackers to read arbitrary files by inserting the target filename into a text box, then turning that box into a file upload control.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-0:1.5.0.5-0.el4.1.src", "4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-0:1.5.0.5-0.el4.1.src", "4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-0:1.5.0.5-0.el4.1.src", "4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2782" }, { "category": "external", "summary": "RHBZ#1618116", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618116" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2782", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2782" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2782", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2782" } ], "release_date": "2006-06-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-29T00:16:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-0:1.5.0.5-0.el4.1.src", "4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-0:1.5.0.5-0.el4.1.src", "4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-0:1.5.0.5-0.el4.1.src", "4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0611" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2006-2783", "discovery_date": "2006-05-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618117" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox and Thunderbird before 1.5.0.4 strip the Unicode Byte-order-Mark (BOM) from a UTF-8 page before the page is passed to the parser, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a BOM sequence in the middle of a dangerous tag such as SCRIPT.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-0:1.5.0.5-0.el4.1.src", "4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-0:1.5.0.5-0.el4.1.src", "4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-0:1.5.0.5-0.el4.1.src", "4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2783" }, { "category": "external", "summary": "RHBZ#1618117", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618117" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2783", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2783" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2783", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2783" } ], "release_date": "2006-06-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-29T00:16:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-0:1.5.0.5-0.el4.1.src", "4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-0:1.5.0.5-0.el4.1.src", "4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-0:1.5.0.5-0.el4.1.src", "4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0611" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2006-2784", "discovery_date": "2006-05-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618118" } ], "notes": [ { "category": "description", "text": "The PLUGINSPAGE functionality in Mozilla Firefox before 1.5.0.4 allows remote user-assisted attackers to execute privileged code by tricking a user into installing missing plugins and selecting the \"Manual Install\" button, then using nested javascript: URLs. NOTE: the manual install button is used for downloading software from a remote web site, so this issue would not cross privilege boundaries if the user progresses to the point of installing malicious software from the attacker-controlled site.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-0:1.5.0.5-0.el4.1.src", "4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-0:1.5.0.5-0.el4.1.src", "4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-0:1.5.0.5-0.el4.1.src", "4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2784" }, { "category": "external", "summary": "RHBZ#1618118", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618118" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2784", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2784" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2784", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2784" } ], "release_date": "2006-06-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-29T00:16:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-0:1.5.0.5-0.el4.1.src", "4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-0:1.5.0.5-0.el4.1.src", "4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-0:1.5.0.5-0.el4.1.src", "4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0611" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2006-2785", "discovery_date": "2006-05-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618119" } ], "notes": [ { "category": "description", "text": "Cross-site scripting (XSS) vulnerability in Mozilla Firefox before 1.5.0.4 allows user-assisted remote attackers to inject arbitrary web script or HTML by tricking a user into (1) performing a \"View Image\" on a broken image in which the SRC attribute contains a Javascript URL, or (2) selecting \"Show only this frame\" on a frame whose SRC attribute contains a Javascript URL.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-0:1.5.0.5-0.el4.1.src", "4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-0:1.5.0.5-0.el4.1.src", "4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-0:1.5.0.5-0.el4.1.src", "4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2785" }, { "category": "external", "summary": "RHBZ#1618119", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618119" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2785", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2785" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2785", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2785" } ], "release_date": "2006-06-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-29T00:16:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-0:1.5.0.5-0.el4.1.src", "4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-0:1.5.0.5-0.el4.1.src", "4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-0:1.5.0.5-0.el4.1.src", "4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0611" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2006-2786", "discovery_date": "2006-05-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618120" } ], "notes": [ { "category": "description", "text": "HTTP response smuggling vulnerability in Mozilla Firefox and Thunderbird before 1.5.0.4, when used with certain proxy servers, allows remote attackers to cause Firefox to interpret certain responses as if they were responses from two different sites via (1) invalid HTTP response headers with spaces between the header name and the colon, which might not be ignored in some cases, or (2) HTTP 1.1 headers through an HTTP 1.0 proxy, which are ignored by the proxy but processed by the client.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-0:1.5.0.5-0.el4.1.src", "4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-0:1.5.0.5-0.el4.1.src", "4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-0:1.5.0.5-0.el4.1.src", "4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2786" }, { "category": "external", "summary": "RHBZ#1618120", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618120" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2786", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2786" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2786", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2786" } ], "release_date": "2006-06-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-29T00:16:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-0:1.5.0.5-0.el4.1.src", "4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-0:1.5.0.5-0.el4.1.src", "4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-0:1.5.0.5-0.el4.1.src", "4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0611" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2006-2787", "discovery_date": "2006-05-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618121" } ], "notes": [ { "category": "description", "text": "EvalInSandbox in Mozilla Firefox and Thunderbird before 1.5.0.4 allows remote attackers to gain privileges via javascript that calls the valueOf method on objects that were created outside of the sandbox.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-0:1.5.0.5-0.el4.1.src", "4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-0:1.5.0.5-0.el4.1.src", "4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-0:1.5.0.5-0.el4.1.src", "4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2787" }, { "category": "external", "summary": "RHBZ#1618121", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618121" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2787", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2787" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2787", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2787" } ], "release_date": "2006-06-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-29T00:16:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-0:1.5.0.5-0.el4.1.src", "4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-0:1.5.0.5-0.el4.1.src", "4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-0:1.5.0.5-0.el4.1.src", "4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0611" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2006-2788", "discovery_date": "2006-05-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618122" } ], "notes": [ { "category": "description", "text": "Double free vulnerability in the getRawDER function for nsIX509Cert in Firefox allows remote attackers to cause a denial of service (hang) and possibly execute arbitrary code via certain Javascript code.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-0:1.5.0.5-0.el4.1.src", "4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-0:1.5.0.5-0.el4.1.src", "4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-0:1.5.0.5-0.el4.1.src", "4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2788" }, { "category": "external", "summary": "RHBZ#1618122", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618122" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2788", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2788" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2788", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2788" } ], "release_date": "2006-06-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-29T00:16:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-0:1.5.0.5-0.el4.1.src", "4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-0:1.5.0.5-0.el4.1.src", "4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-0:1.5.0.5-0.el4.1.src", "4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0611" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2006-3113", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618135" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox 1.5 before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via simultaneous XPCOM events, which causes a timer object to be deleted in a way that triggers memory corruption.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-0:1.5.0.5-0.el4.1.src", "4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-0:1.5.0.5-0.el4.1.src", "4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-0:1.5.0.5-0.el4.1.src", "4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3113" }, { "category": "external", "summary": "RHBZ#1618135", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618135" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3113", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3113" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3113", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3113" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-29T00:16:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-0:1.5.0.5-0.el4.1.src", "4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-0:1.5.0.5-0.el4.1.src", "4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-0:1.5.0.5-0.el4.1.src", "4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0611" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-3677", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618153" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox 1.5 before 1.5.0.5 and SeaMonkey before 1.0.3 allows remote attackers to execute arbitrary code by changing certain properties of the window navigator object (window.navigator) that are accessed when Java starts up, which causes a crash that leads to code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-0:1.5.0.5-0.el4.1.src", "4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-0:1.5.0.5-0.el4.1.src", "4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-0:1.5.0.5-0.el4.1.src", "4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3677" }, { "category": "external", "summary": "RHBZ#1618153", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618153" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3677", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3677" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3677", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3677" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-29T00:16:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-0:1.5.0.5-0.el4.1.src", "4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-0:1.5.0.5-0.el4.1.src", "4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-0:1.5.0.5-0.el4.1.src", "4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0611" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-3801", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618161" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox 1.5 before 1.5.0.5 and SeaMonkey before 1.0.3 does not properly clear a JavaScript reference to a frame or window, which leaves a pointer to a deleted object that allows remote attackers to execute arbitrary native code.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-0:1.5.0.5-0.el4.1.src", "4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-0:1.5.0.5-0.el4.1.src", "4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-0:1.5.0.5-0.el4.1.src", "4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3801" }, { "category": "external", "summary": "RHBZ#1618161", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618161" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3801", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3801" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3801", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3801" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-29T00:16:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-0:1.5.0.5-0.el4.1.src", "4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-0:1.5.0.5-0.el4.1.src", "4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-0:1.5.0.5-0.el4.1.src", "4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0611" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-3802", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618162" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to hijack native DOM methods from objects in another domain and conduct cross-site scripting (XSS) attacks using DOM methods of the top-level object.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-0:1.5.0.5-0.el4.1.src", "4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-0:1.5.0.5-0.el4.1.src", "4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-0:1.5.0.5-0.el4.1.src", "4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3802" }, { "category": "external", "summary": "RHBZ#1618162", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618162" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3802", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3802" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3802", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3802" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-29T00:16:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-0:1.5.0.5-0.el4.1.src", "4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-0:1.5.0.5-0.el4.1.src", "4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-0:1.5.0.5-0.el4.1.src", "4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0611" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2006-3803", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618163" } ], "notes": [ { "category": "description", "text": "Race condition in the JavaScript garbage collection in Mozilla Firefox 1.5 before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 might allow remote attackers to execute arbitrary code by causing the garbage collector to delete a temporary variable while it is still being used during the creation of a new Function object.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-0:1.5.0.5-0.el4.1.src", "4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-0:1.5.0.5-0.el4.1.src", "4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-0:1.5.0.5-0.el4.1.src", "4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3803" }, { "category": "external", "summary": "RHBZ#1618163", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618163" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3803", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3803" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3803", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3803" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-29T00:16:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-0:1.5.0.5-0.el4.1.src", "4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-0:1.5.0.5-0.el4.1.src", "4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-0:1.5.0.5-0.el4.1.src", "4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0611" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-3804", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618164" } ], "notes": [ { "category": "description", "text": "Heap-based buffer overflow in Mozilla Thunderbird before 1.5.0.5 and SeaMonkey before 1.0.3 allows remote attackers to cause a denial of service (crash) via a VCard attachment with a malformed base64 field, which copies more data than expected due to an integer underflow.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-0:1.5.0.5-0.el4.1.src", "4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-0:1.5.0.5-0.el4.1.src", "4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-0:1.5.0.5-0.el4.1.src", "4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3804" }, { "category": "external", "summary": "RHBZ#1618164", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618164" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3804", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3804" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3804", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3804" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-29T00:16:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-0:1.5.0.5-0.el4.1.src", "4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-0:1.5.0.5-0.el4.1.src", "4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-0:1.5.0.5-0.el4.1.src", "4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0611" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-3805", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618165" } ], "notes": [ { "category": "description", "text": "The Javascript engine in Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 might allow remote attackers to execute arbitrary code via vectors involving garbage collection that causes deletion of a temporary object that is still being used.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-0:1.5.0.5-0.el4.1.src", "4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-0:1.5.0.5-0.el4.1.src", "4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-0:1.5.0.5-0.el4.1.src", "4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3805" }, { "category": "external", "summary": "RHBZ#1618165", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618165" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3805", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3805" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3805", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3805" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-29T00:16:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-0:1.5.0.5-0.el4.1.src", "4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-0:1.5.0.5-0.el4.1.src", "4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-0:1.5.0.5-0.el4.1.src", "4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0611" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-3806", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618166" } ], "notes": [ { "category": "description", "text": "Multiple integer overflows in the Javascript engine in Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 might allow remote attackers to execute arbitrary code via vectors involving (1) long strings in the toSource method of the Object, Array, and String objects; and (2) unspecified \"string function arguments.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-0:1.5.0.5-0.el4.1.src", "4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-0:1.5.0.5-0.el4.1.src", "4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-0:1.5.0.5-0.el4.1.src", "4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3806" }, { "category": "external", "summary": "RHBZ#1618166", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618166" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3806", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3806" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3806", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3806" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-29T00:16:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-0:1.5.0.5-0.el4.1.src", "4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-0:1.5.0.5-0.el4.1.src", "4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-0:1.5.0.5-0.el4.1.src", "4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0611" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-3807", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618167" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to execute arbitrary code via script that changes the standard Object() constructor to return a reference to a privileged object and calling \"named JavaScript functions\" that use the constructor.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-0:1.5.0.5-0.el4.1.src", "4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-0:1.5.0.5-0.el4.1.src", "4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-0:1.5.0.5-0.el4.1.src", "4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3807" }, { "category": "external", "summary": "RHBZ#1618167", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618167" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3807", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3807" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3807", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3807" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-29T00:16:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-0:1.5.0.5-0.el4.1.src", "4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-0:1.5.0.5-0.el4.1.src", "4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-0:1.5.0.5-0.el4.1.src", "4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0611" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-3808", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618168" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox before 1.5.0.5 and SeaMonkey before 1.0.3 allows remote Proxy AutoConfig (PAC) servers to execute code with elevated privileges via a PAC script that sets the FindProxyForURL function to an eval method on a privileged object.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-0:1.5.0.5-0.el4.1.src", "4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-0:1.5.0.5-0.el4.1.src", "4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-0:1.5.0.5-0.el4.1.src", "4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3808" }, { "category": "external", "summary": "RHBZ#1618168", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618168" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3808", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3808" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3808", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3808" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-29T00:16:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-0:1.5.0.5-0.el4.1.src", "4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-0:1.5.0.5-0.el4.1.src", "4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-0:1.5.0.5-0.el4.1.src", "4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0611" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2006-3809", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618169" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows scripts with the UniversalBrowserRead privilege to gain UniversalXPConnect privileges and possibly execute code or obtain sensitive data by reading into a privileged context.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-0:1.5.0.5-0.el4.1.src", "4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-0:1.5.0.5-0.el4.1.src", "4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-0:1.5.0.5-0.el4.1.src", "4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3809" }, { "category": "external", "summary": "RHBZ#1618169", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618169" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3809", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3809" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3809", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3809" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-29T00:16:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-0:1.5.0.5-0.el4.1.src", "4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-0:1.5.0.5-0.el4.1.src", "4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-0:1.5.0.5-0.el4.1.src", "4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0611" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-3810", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618170" } ], "notes": [ { "category": "description", "text": "Cross-site scripting (XSS) vulnerability in Mozilla Firefox 1.5 before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to inject arbitrary web script or HTML via the XPCNativeWrapper(window).Function construct.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-0:1.5.0.5-0.el4.1.src", "4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-0:1.5.0.5-0.el4.1.src", "4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-0:1.5.0.5-0.el4.1.src", "4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3810" }, { "category": "external", "summary": "RHBZ#1618170", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618170" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3810", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3810" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3810", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3810" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-29T00:16:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-0:1.5.0.5-0.el4.1.src", "4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-0:1.5.0.5-0.el4.1.src", "4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-0:1.5.0.5-0.el4.1.src", "4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0611" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2006-3811", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618171" } ], "notes": [ { "category": "description", "text": "Multiple vulnerabilities in Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via Javascript that leads to memory corruption, including (1) nsListControlFrame::FireMenuItemActiveEvent, (2) buffer overflows in the string class in out-of-memory conditions, (3) table row and column groups, (4) \"anonymous box selectors outside of UA stylesheets,\" (5) stale references to \"removed nodes,\" and (6) running the crypto.generateCRMFRequest callback on deleted context.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-0:1.5.0.5-0.el4.1.src", "4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-0:1.5.0.5-0.el4.1.src", "4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-0:1.5.0.5-0.el4.1.src", "4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3811" }, { "category": "external", "summary": "RHBZ#1618171", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618171" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3811", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3811" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3811", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3811" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-29T00:16:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-0:1.5.0.5-0.el4.1.src", "4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-0:1.5.0.5-0.el4.1.src", "4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-0:1.5.0.5-0.el4.1.src", "4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0611" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" } ] }
rhsa-2006:0611
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated thunderbird packages that fix several security bugs are now\navailable for Red Hat Enterprise Linux 4.\n\nThis update has been rated as having critical security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "Mozilla Thunderbird is a standalone mail and newsgroup client.\n\nThe Mozilla Foundation has discontinued support for the Mozilla Thunderbird\n1.0 branch. This update deprecates the Mozilla Thunderbird 1.0 branch in\nRed Hat Enterprise Linux 4 in favor of the supported Mozilla Thunderbird\n1.5 branch.\n\nThis update also resolves a number of outstanding Thunderbird security issues:\n\nSeveral flaws were found in the way Thunderbird processed certain\njavascript actions. A malicious mail message could execute arbitrary\njavascript instructions with the permissions of \"chrome\", allowing the page\nto steal sensitive information or install browser malware. (CVE-2006-2776,\nCVE-2006-2784, CVE-2006-2785, CVE-2006-2787, CVE-2006-3807, CVE-2006-3809)\n\nSeveral denial of service flaws were found in the way Thunderbird processed\ncertain mail messages. A malicious web page could crash the browser or\npossibly execute arbitrary code as the user running Thunderbird.\n(CVE-2006-2779, CVE-2006-2780, CVE-2006-3801, CVE-2006-3677,\nCVE-2006-3113, CVE-2006-3803, CVE-2006-3805, CVE-2006-3806, CVE-2006-3811)\n\nSeveral flaws were found in the way Thunderbird processed certain\njavascript actions. A malicious mail message could conduct a cross-site\nscripting attack or steal sensitive information (such as cookies owned by\nother domains). (CVE-2006-3802, CVE-2006-3810)\n\nA form file upload flaw was found in the way Thunderbird handled javascript\ninput object mutation. A malicious mail message could upload an arbitrary\nlocal file at form submission time without user interaction. (CVE-2006-2782)\n\nA denial of service flaw was found in the way Thunderbird called the\ncrypto.signText() javascript function. A malicious mail message could crash\nthe browser if the victim had a client certificate loaded. (CVE-2006-2778)\n\nA flaw was found in the way Thunderbird processed Proxy AutoConfig scripts.\nA malicious Proxy AutoConfig server could execute arbitrary javascript\ninstructions with the permissions of \"chrome\", allowing the page to steal\nsensitive information or install client malware. (CVE-2006-3808)\n\nNote: Please note that JavaScript support is disabled by default in\nThunderbird. The above issues are not exploitable with JavaScript disabled. \n\nTwo flaws were found in the way Thunderbird displayed malformed inline\nvcard attachments. If a victim viewed an email message containing a\ncarefully crafted vcard it was possible to execute arbitrary code as the\nuser running Thunderbird. (CVE-2006-2781, CVE-2006-3804)\n\nA cross site scripting flaw was found in the way Thunderbird processed\nUnicode Byte-order-Mark (BOM) markers in UTF-8 mail messages. A malicious\nweb page could execute a script within the browser that a web input\nsanitizer could miss due to a malformed \"script\" tag. (CVE-2006-2783)\n\nTwo HTTP response smuggling flaws were found in the way Thunderbird\nprocessed certain invalid HTTP response headers. A malicious web site could\nreturn specially crafted HTTP response headers which may bypass HTTP proxy\nrestrictions. (CVE-2006-2786)\n\nA double free flaw was found in the way the nsIX509::getRawDER method was\ncalled. If a victim visited a carefully crafted web page, it was possible\nto crash Thunderbird. (CVE-2006-2788)\n\nUsers of Thunderbird are advised to upgrade to this update, which contains\nThunderbird version 1.5.0.5 that corrects these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2006:0611", "url": "https://access.redhat.com/errata/RHSA-2006:0611" }, { "category": "external", "summary": "http://www.redhat.com/security/updates/classification/#critical", "url": "http://www.redhat.com/security/updates/classification/#critical" }, { "category": "external", "summary": "197078", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=197078" }, { "category": "external", "summary": "200171", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=200171" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2006/rhsa-2006_0611.json" } ], "title": "Red Hat Security Advisory: thunderbird security update", "tracking": { "current_release_date": "2025-09-10T13:38:42+00:00", "generator": { "date": "2025-09-10T13:38:42+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.7" } }, "id": "RHSA-2006:0611", "initial_release_date": "2006-07-29T00:16:00+00:00", "revision_history": [ { "date": "2006-07-29T00:16:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2006-07-28T00:00:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-09-10T13:38:42+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 4", "product": { "name": "Red Hat Enterprise Linux AS version 4", "product_id": "4AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::as" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop version 4", "product": { "name": "Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 4", "product": { "name": "Red Hat Enterprise Linux ES version 4", "product_id": "4ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 4", "product": { "name": "Red Hat Enterprise Linux WS version 4", "product_id": "4WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::ws" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "thunderbird-0:1.5.0.5-0.el4.1.ia64", "product": { "name": "thunderbird-0:1.5.0.5-0.el4.1.ia64", "product_id": "thunderbird-0:1.5.0.5-0.el4.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird@1.5.0.5-0.el4.1?arch=ia64" } } }, { "category": "product_version", "name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "product": { "name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "product_id": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird-debuginfo@1.5.0.5-0.el4.1?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "thunderbird-0:1.5.0.5-0.el4.1.src", "product": { "name": "thunderbird-0:1.5.0.5-0.el4.1.src", "product_id": "thunderbird-0:1.5.0.5-0.el4.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird@1.5.0.5-0.el4.1?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "thunderbird-0:1.5.0.5-0.el4.1.x86_64", "product": { "name": "thunderbird-0:1.5.0.5-0.el4.1.x86_64", "product_id": "thunderbird-0:1.5.0.5-0.el4.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird@1.5.0.5-0.el4.1?arch=x86_64" } } }, { "category": "product_version", "name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "product": { "name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "product_id": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird-debuginfo@1.5.0.5-0.el4.1?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "thunderbird-0:1.5.0.5-0.el4.1.i386", "product": { "name": "thunderbird-0:1.5.0.5-0.el4.1.i386", "product_id": "thunderbird-0:1.5.0.5-0.el4.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird@1.5.0.5-0.el4.1?arch=i386" } } }, { "category": "product_version", "name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "product": { "name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "product_id": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird-debuginfo@1.5.0.5-0.el4.1?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "thunderbird-0:1.5.0.5-0.el4.1.ppc", "product": { "name": "thunderbird-0:1.5.0.5-0.el4.1.ppc", "product_id": "thunderbird-0:1.5.0.5-0.el4.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird@1.5.0.5-0.el4.1?arch=ppc" } } }, { "category": "product_version", "name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "product": { "name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "product_id": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird-debuginfo@1.5.0.5-0.el4.1?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "thunderbird-0:1.5.0.5-0.el4.1.s390x", "product": { "name": "thunderbird-0:1.5.0.5-0.el4.1.s390x", "product_id": "thunderbird-0:1.5.0.5-0.el4.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird@1.5.0.5-0.el4.1?arch=s390x" } } }, { "category": "product_version", "name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "product": { "name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "product_id": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird-debuginfo@1.5.0.5-0.el4.1?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "thunderbird-0:1.5.0.5-0.el4.1.s390", "product": { "name": "thunderbird-0:1.5.0.5-0.el4.1.s390", "product_id": "thunderbird-0:1.5.0.5-0.el4.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird@1.5.0.5-0.el4.1?arch=s390" } } }, { "category": "product_version", "name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "product": { "name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "product_id": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird-debuginfo@1.5.0.5-0.el4.1?arch=s390" } } } ], "category": "architecture", "name": "s390" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.5-0.el4.1.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:thunderbird-0:1.5.0.5-0.el4.1.i386" }, "product_reference": "thunderbird-0:1.5.0.5-0.el4.1.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.5-0.el4.1.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64" }, "product_reference": "thunderbird-0:1.5.0.5-0.el4.1.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.5-0.el4.1.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc" }, "product_reference": "thunderbird-0:1.5.0.5-0.el4.1.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.5-0.el4.1.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390" }, "product_reference": "thunderbird-0:1.5.0.5-0.el4.1.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.5-0.el4.1.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x" }, "product_reference": "thunderbird-0:1.5.0.5-0.el4.1.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.5-0.el4.1.src as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:thunderbird-0:1.5.0.5-0.el4.1.src" }, "product_reference": "thunderbird-0:1.5.0.5-0.el4.1.src", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.5-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64" }, "product_reference": "thunderbird-0:1.5.0.5-0.el4.1.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386" }, "product_reference": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64" }, "product_reference": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc" }, "product_reference": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390" }, "product_reference": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x" }, "product_reference": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" }, "product_reference": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.5-0.el4.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386" }, "product_reference": "thunderbird-0:1.5.0.5-0.el4.1.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.5-0.el4.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64" }, "product_reference": "thunderbird-0:1.5.0.5-0.el4.1.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.5-0.el4.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc" }, "product_reference": "thunderbird-0:1.5.0.5-0.el4.1.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.5-0.el4.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390" }, "product_reference": "thunderbird-0:1.5.0.5-0.el4.1.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.5-0.el4.1.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x" }, "product_reference": "thunderbird-0:1.5.0.5-0.el4.1.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.5-0.el4.1.src as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src" }, "product_reference": "thunderbird-0:1.5.0.5-0.el4.1.src", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.5-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64" }, "product_reference": "thunderbird-0:1.5.0.5-0.el4.1.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386" }, "product_reference": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64" }, "product_reference": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc" }, "product_reference": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390" }, "product_reference": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x" }, "product_reference": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" }, "product_reference": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.5-0.el4.1.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:thunderbird-0:1.5.0.5-0.el4.1.i386" }, "product_reference": "thunderbird-0:1.5.0.5-0.el4.1.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.5-0.el4.1.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64" }, "product_reference": "thunderbird-0:1.5.0.5-0.el4.1.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.5-0.el4.1.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc" }, "product_reference": "thunderbird-0:1.5.0.5-0.el4.1.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.5-0.el4.1.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390" }, "product_reference": "thunderbird-0:1.5.0.5-0.el4.1.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.5-0.el4.1.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x" }, "product_reference": "thunderbird-0:1.5.0.5-0.el4.1.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.5-0.el4.1.src as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:thunderbird-0:1.5.0.5-0.el4.1.src" }, "product_reference": "thunderbird-0:1.5.0.5-0.el4.1.src", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.5-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64" }, "product_reference": "thunderbird-0:1.5.0.5-0.el4.1.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386" }, "product_reference": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64" }, "product_reference": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc" }, "product_reference": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390" }, "product_reference": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x" }, "product_reference": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" }, "product_reference": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.5-0.el4.1.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:thunderbird-0:1.5.0.5-0.el4.1.i386" }, "product_reference": "thunderbird-0:1.5.0.5-0.el4.1.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.5-0.el4.1.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64" }, "product_reference": "thunderbird-0:1.5.0.5-0.el4.1.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.5-0.el4.1.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc" }, "product_reference": "thunderbird-0:1.5.0.5-0.el4.1.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.5-0.el4.1.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390" }, "product_reference": "thunderbird-0:1.5.0.5-0.el4.1.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.5-0.el4.1.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x" }, "product_reference": "thunderbird-0:1.5.0.5-0.el4.1.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.5-0.el4.1.src as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:thunderbird-0:1.5.0.5-0.el4.1.src" }, "product_reference": "thunderbird-0:1.5.0.5-0.el4.1.src", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.5-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64" }, "product_reference": "thunderbird-0:1.5.0.5-0.el4.1.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386" }, "product_reference": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64" }, "product_reference": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc" }, "product_reference": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390" }, "product_reference": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x" }, "product_reference": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" }, "product_reference": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "relates_to_product_reference": "4WS" } ] }, "vulnerabilities": [ { "cve": "CVE-2006-2776", "discovery_date": "2006-05-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618112" } ], "notes": [ { "category": "description", "text": "Certain privileged UI code in Mozilla Firefox and Thunderbird before 1.5.0.4 calls content-defined setters on an object prototype, which allows remote attackers to execute code at a higher privilege than intended.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-0:1.5.0.5-0.el4.1.src", "4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-0:1.5.0.5-0.el4.1.src", "4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-0:1.5.0.5-0.el4.1.src", "4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2776" }, { "category": "external", "summary": "RHBZ#1618112", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618112" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2776", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2776" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2776", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2776" } ], "release_date": "2006-06-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-29T00:16:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-0:1.5.0.5-0.el4.1.src", "4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-0:1.5.0.5-0.el4.1.src", "4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-0:1.5.0.5-0.el4.1.src", "4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0611" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2006-2778", "discovery_date": "2006-05-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618113" } ], "notes": [ { "category": "description", "text": "The crypto.signText function in Mozilla Firefox and Thunderbird before 1.5.0.4 allows remote attackers to execute arbitrary code via certain optional Certificate Authority name arguments, which causes an invalid array index and triggers a buffer overflow.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-0:1.5.0.5-0.el4.1.src", "4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-0:1.5.0.5-0.el4.1.src", "4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-0:1.5.0.5-0.el4.1.src", "4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2778" }, { "category": "external", "summary": "RHBZ#1618113", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618113" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2778", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2778" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2778", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2778" } ], "release_date": "2006-06-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-29T00:16:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-0:1.5.0.5-0.el4.1.src", "4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-0:1.5.0.5-0.el4.1.src", "4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-0:1.5.0.5-0.el4.1.src", "4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0611" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2006-2779", "discovery_date": "2006-06-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618114" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox and Thunderbird before 1.5.0.4 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via (1) nested \u003coption\u003e tags in a select tag, (2) a DOMNodeRemoved mutation event, (3) \"Content-implemented tree views,\" (4) BoxObjects, (5) the XBL implementation, (6) an iframe that attempts to remove itself, which leads to memory corruption.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-0:1.5.0.5-0.el4.1.src", "4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-0:1.5.0.5-0.el4.1.src", "4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-0:1.5.0.5-0.el4.1.src", "4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2779" }, { "category": "external", "summary": "RHBZ#1618114", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618114" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2779", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2779" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2779", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2779" } ], "release_date": "2006-06-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-29T00:16:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-0:1.5.0.5-0.el4.1.src", "4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-0:1.5.0.5-0.el4.1.src", "4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-0:1.5.0.5-0.el4.1.src", "4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0611" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-2780", "discovery_date": "2006-06-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618115" } ], "notes": [ { "category": "description", "text": "Integer overflow in Mozilla Firefox and Thunderbird before 1.5.0.4 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via \"jsstr tagify,\" which leads to memory corruption.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-0:1.5.0.5-0.el4.1.src", "4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-0:1.5.0.5-0.el4.1.src", "4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-0:1.5.0.5-0.el4.1.src", "4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2780" }, { "category": "external", "summary": "RHBZ#1618115", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618115" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2780", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2780" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2780", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2780" } ], "release_date": "2006-06-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-29T00:16:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-0:1.5.0.5-0.el4.1.src", "4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-0:1.5.0.5-0.el4.1.src", "4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-0:1.5.0.5-0.el4.1.src", "4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0611" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-2781", "discovery_date": "2006-06-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "193963" } ], "notes": [ { "category": "description", "text": "Double free vulnerability in nsVCard.cpp in Mozilla Thunderbird before 1.5.0.4 and SeaMonkey before 1.0.2 allows remote attackers to cause a denial of service (hang) and possibly execute arbitrary code via a VCard that contains invalid base64 characters.", "title": "Vulnerability description" }, { "category": "summary", "text": "(seamonkey): DOS/arbitrary code execution vuln with vcards", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-0:1.5.0.5-0.el4.1.src", "4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-0:1.5.0.5-0.el4.1.src", "4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-0:1.5.0.5-0.el4.1.src", "4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2781" }, { "category": "external", "summary": "RHBZ#193963", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=193963" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2781", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2781" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2781", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2781" } ], "release_date": "2006-06-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-29T00:16:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-0:1.5.0.5-0.el4.1.src", "4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-0:1.5.0.5-0.el4.1.src", "4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-0:1.5.0.5-0.el4.1.src", "4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0611" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "(seamonkey): DOS/arbitrary code execution vuln with vcards" }, { "cve": "CVE-2006-2782", "discovery_date": "2006-05-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618116" } ], "notes": [ { "category": "description", "text": "Firefox 1.5.0.2 does not fix all test cases associated with CVE-2006-1729, which allows remote attackers to read arbitrary files by inserting the target filename into a text box, then turning that box into a file upload control.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-0:1.5.0.5-0.el4.1.src", "4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-0:1.5.0.5-0.el4.1.src", "4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-0:1.5.0.5-0.el4.1.src", "4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2782" }, { "category": "external", "summary": "RHBZ#1618116", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618116" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2782", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2782" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2782", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2782" } ], "release_date": "2006-06-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-29T00:16:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-0:1.5.0.5-0.el4.1.src", "4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-0:1.5.0.5-0.el4.1.src", "4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-0:1.5.0.5-0.el4.1.src", "4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0611" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2006-2783", "discovery_date": "2006-05-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618117" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox and Thunderbird before 1.5.0.4 strip the Unicode Byte-order-Mark (BOM) from a UTF-8 page before the page is passed to the parser, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a BOM sequence in the middle of a dangerous tag such as SCRIPT.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-0:1.5.0.5-0.el4.1.src", "4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-0:1.5.0.5-0.el4.1.src", "4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-0:1.5.0.5-0.el4.1.src", "4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2783" }, { "category": "external", "summary": "RHBZ#1618117", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618117" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2783", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2783" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2783", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2783" } ], "release_date": "2006-06-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-29T00:16:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-0:1.5.0.5-0.el4.1.src", "4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-0:1.5.0.5-0.el4.1.src", "4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-0:1.5.0.5-0.el4.1.src", "4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0611" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2006-2784", "discovery_date": "2006-05-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618118" } ], "notes": [ { "category": "description", "text": "The PLUGINSPAGE functionality in Mozilla Firefox before 1.5.0.4 allows remote user-assisted attackers to execute privileged code by tricking a user into installing missing plugins and selecting the \"Manual Install\" button, then using nested javascript: URLs. NOTE: the manual install button is used for downloading software from a remote web site, so this issue would not cross privilege boundaries if the user progresses to the point of installing malicious software from the attacker-controlled site.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-0:1.5.0.5-0.el4.1.src", "4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-0:1.5.0.5-0.el4.1.src", "4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-0:1.5.0.5-0.el4.1.src", "4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2784" }, { "category": "external", "summary": "RHBZ#1618118", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618118" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2784", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2784" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2784", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2784" } ], "release_date": "2006-06-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-29T00:16:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-0:1.5.0.5-0.el4.1.src", "4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-0:1.5.0.5-0.el4.1.src", "4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-0:1.5.0.5-0.el4.1.src", "4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0611" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2006-2785", "discovery_date": "2006-05-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618119" } ], "notes": [ { "category": "description", "text": "Cross-site scripting (XSS) vulnerability in Mozilla Firefox before 1.5.0.4 allows user-assisted remote attackers to inject arbitrary web script or HTML by tricking a user into (1) performing a \"View Image\" on a broken image in which the SRC attribute contains a Javascript URL, or (2) selecting \"Show only this frame\" on a frame whose SRC attribute contains a Javascript URL.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-0:1.5.0.5-0.el4.1.src", "4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-0:1.5.0.5-0.el4.1.src", "4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-0:1.5.0.5-0.el4.1.src", "4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2785" }, { "category": "external", "summary": "RHBZ#1618119", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618119" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2785", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2785" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2785", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2785" } ], "release_date": "2006-06-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-29T00:16:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-0:1.5.0.5-0.el4.1.src", "4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-0:1.5.0.5-0.el4.1.src", "4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-0:1.5.0.5-0.el4.1.src", "4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0611" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2006-2786", "discovery_date": "2006-05-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618120" } ], "notes": [ { "category": "description", "text": "HTTP response smuggling vulnerability in Mozilla Firefox and Thunderbird before 1.5.0.4, when used with certain proxy servers, allows remote attackers to cause Firefox to interpret certain responses as if they were responses from two different sites via (1) invalid HTTP response headers with spaces between the header name and the colon, which might not be ignored in some cases, or (2) HTTP 1.1 headers through an HTTP 1.0 proxy, which are ignored by the proxy but processed by the client.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-0:1.5.0.5-0.el4.1.src", "4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-0:1.5.0.5-0.el4.1.src", "4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-0:1.5.0.5-0.el4.1.src", "4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2786" }, { "category": "external", "summary": "RHBZ#1618120", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618120" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2786", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2786" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2786", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2786" } ], "release_date": "2006-06-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-29T00:16:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-0:1.5.0.5-0.el4.1.src", "4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-0:1.5.0.5-0.el4.1.src", "4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-0:1.5.0.5-0.el4.1.src", "4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0611" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2006-2787", "discovery_date": "2006-05-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618121" } ], "notes": [ { "category": "description", "text": "EvalInSandbox in Mozilla Firefox and Thunderbird before 1.5.0.4 allows remote attackers to gain privileges via javascript that calls the valueOf method on objects that were created outside of the sandbox.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-0:1.5.0.5-0.el4.1.src", "4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-0:1.5.0.5-0.el4.1.src", "4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-0:1.5.0.5-0.el4.1.src", "4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2787" }, { "category": "external", "summary": "RHBZ#1618121", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618121" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2787", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2787" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2787", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2787" } ], "release_date": "2006-06-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-29T00:16:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-0:1.5.0.5-0.el4.1.src", "4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-0:1.5.0.5-0.el4.1.src", "4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-0:1.5.0.5-0.el4.1.src", "4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0611" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2006-2788", "discovery_date": "2006-05-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618122" } ], "notes": [ { "category": "description", "text": "Double free vulnerability in the getRawDER function for nsIX509Cert in Firefox allows remote attackers to cause a denial of service (hang) and possibly execute arbitrary code via certain Javascript code.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-0:1.5.0.5-0.el4.1.src", "4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-0:1.5.0.5-0.el4.1.src", "4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-0:1.5.0.5-0.el4.1.src", "4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2788" }, { "category": "external", "summary": "RHBZ#1618122", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618122" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2788", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2788" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2788", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2788" } ], "release_date": "2006-06-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-29T00:16:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-0:1.5.0.5-0.el4.1.src", "4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-0:1.5.0.5-0.el4.1.src", "4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-0:1.5.0.5-0.el4.1.src", "4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0611" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2006-3113", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618135" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox 1.5 before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via simultaneous XPCOM events, which causes a timer object to be deleted in a way that triggers memory corruption.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-0:1.5.0.5-0.el4.1.src", "4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-0:1.5.0.5-0.el4.1.src", "4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-0:1.5.0.5-0.el4.1.src", "4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3113" }, { "category": "external", "summary": "RHBZ#1618135", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618135" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3113", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3113" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3113", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3113" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-29T00:16:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-0:1.5.0.5-0.el4.1.src", "4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-0:1.5.0.5-0.el4.1.src", "4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-0:1.5.0.5-0.el4.1.src", "4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0611" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-3677", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618153" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox 1.5 before 1.5.0.5 and SeaMonkey before 1.0.3 allows remote attackers to execute arbitrary code by changing certain properties of the window navigator object (window.navigator) that are accessed when Java starts up, which causes a crash that leads to code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-0:1.5.0.5-0.el4.1.src", "4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-0:1.5.0.5-0.el4.1.src", "4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-0:1.5.0.5-0.el4.1.src", "4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3677" }, { "category": "external", "summary": "RHBZ#1618153", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618153" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3677", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3677" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3677", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3677" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-29T00:16:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-0:1.5.0.5-0.el4.1.src", "4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-0:1.5.0.5-0.el4.1.src", "4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-0:1.5.0.5-0.el4.1.src", "4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0611" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-3801", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618161" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox 1.5 before 1.5.0.5 and SeaMonkey before 1.0.3 does not properly clear a JavaScript reference to a frame or window, which leaves a pointer to a deleted object that allows remote attackers to execute arbitrary native code.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-0:1.5.0.5-0.el4.1.src", "4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-0:1.5.0.5-0.el4.1.src", "4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-0:1.5.0.5-0.el4.1.src", "4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3801" }, { "category": "external", "summary": "RHBZ#1618161", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618161" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3801", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3801" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3801", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3801" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-29T00:16:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-0:1.5.0.5-0.el4.1.src", "4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-0:1.5.0.5-0.el4.1.src", "4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-0:1.5.0.5-0.el4.1.src", "4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0611" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-3802", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618162" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to hijack native DOM methods from objects in another domain and conduct cross-site scripting (XSS) attacks using DOM methods of the top-level object.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-0:1.5.0.5-0.el4.1.src", "4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-0:1.5.0.5-0.el4.1.src", "4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-0:1.5.0.5-0.el4.1.src", "4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3802" }, { "category": "external", "summary": "RHBZ#1618162", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618162" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3802", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3802" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3802", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3802" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-29T00:16:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-0:1.5.0.5-0.el4.1.src", "4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-0:1.5.0.5-0.el4.1.src", "4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-0:1.5.0.5-0.el4.1.src", "4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0611" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2006-3803", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618163" } ], "notes": [ { "category": "description", "text": "Race condition in the JavaScript garbage collection in Mozilla Firefox 1.5 before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 might allow remote attackers to execute arbitrary code by causing the garbage collector to delete a temporary variable while it is still being used during the creation of a new Function object.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-0:1.5.0.5-0.el4.1.src", "4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-0:1.5.0.5-0.el4.1.src", "4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-0:1.5.0.5-0.el4.1.src", "4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3803" }, { "category": "external", "summary": "RHBZ#1618163", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618163" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3803", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3803" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3803", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3803" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-29T00:16:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-0:1.5.0.5-0.el4.1.src", "4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-0:1.5.0.5-0.el4.1.src", "4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-0:1.5.0.5-0.el4.1.src", "4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0611" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-3804", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618164" } ], "notes": [ { "category": "description", "text": "Heap-based buffer overflow in Mozilla Thunderbird before 1.5.0.5 and SeaMonkey before 1.0.3 allows remote attackers to cause a denial of service (crash) via a VCard attachment with a malformed base64 field, which copies more data than expected due to an integer underflow.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-0:1.5.0.5-0.el4.1.src", "4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-0:1.5.0.5-0.el4.1.src", "4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-0:1.5.0.5-0.el4.1.src", "4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3804" }, { "category": "external", "summary": "RHBZ#1618164", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618164" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3804", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3804" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3804", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3804" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-29T00:16:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-0:1.5.0.5-0.el4.1.src", "4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-0:1.5.0.5-0.el4.1.src", "4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-0:1.5.0.5-0.el4.1.src", "4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0611" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-3805", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618165" } ], "notes": [ { "category": "description", "text": "The Javascript engine in Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 might allow remote attackers to execute arbitrary code via vectors involving garbage collection that causes deletion of a temporary object that is still being used.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-0:1.5.0.5-0.el4.1.src", "4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-0:1.5.0.5-0.el4.1.src", "4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-0:1.5.0.5-0.el4.1.src", "4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3805" }, { "category": "external", "summary": "RHBZ#1618165", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618165" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3805", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3805" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3805", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3805" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-29T00:16:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-0:1.5.0.5-0.el4.1.src", "4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-0:1.5.0.5-0.el4.1.src", "4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-0:1.5.0.5-0.el4.1.src", "4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0611" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-3806", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618166" } ], "notes": [ { "category": "description", "text": "Multiple integer overflows in the Javascript engine in Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 might allow remote attackers to execute arbitrary code via vectors involving (1) long strings in the toSource method of the Object, Array, and String objects; and (2) unspecified \"string function arguments.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-0:1.5.0.5-0.el4.1.src", "4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-0:1.5.0.5-0.el4.1.src", "4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-0:1.5.0.5-0.el4.1.src", "4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3806" }, { "category": "external", "summary": "RHBZ#1618166", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618166" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3806", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3806" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3806", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3806" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-29T00:16:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-0:1.5.0.5-0.el4.1.src", "4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-0:1.5.0.5-0.el4.1.src", "4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-0:1.5.0.5-0.el4.1.src", "4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0611" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-3807", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618167" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to execute arbitrary code via script that changes the standard Object() constructor to return a reference to a privileged object and calling \"named JavaScript functions\" that use the constructor.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-0:1.5.0.5-0.el4.1.src", "4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-0:1.5.0.5-0.el4.1.src", "4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-0:1.5.0.5-0.el4.1.src", "4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3807" }, { "category": "external", "summary": "RHBZ#1618167", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618167" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3807", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3807" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3807", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3807" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-29T00:16:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-0:1.5.0.5-0.el4.1.src", "4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-0:1.5.0.5-0.el4.1.src", "4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-0:1.5.0.5-0.el4.1.src", "4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0611" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-3808", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618168" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox before 1.5.0.5 and SeaMonkey before 1.0.3 allows remote Proxy AutoConfig (PAC) servers to execute code with elevated privileges via a PAC script that sets the FindProxyForURL function to an eval method on a privileged object.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-0:1.5.0.5-0.el4.1.src", "4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-0:1.5.0.5-0.el4.1.src", "4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-0:1.5.0.5-0.el4.1.src", "4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3808" }, { "category": "external", "summary": "RHBZ#1618168", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618168" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3808", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3808" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3808", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3808" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-29T00:16:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-0:1.5.0.5-0.el4.1.src", "4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-0:1.5.0.5-0.el4.1.src", "4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-0:1.5.0.5-0.el4.1.src", "4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0611" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2006-3809", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618169" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows scripts with the UniversalBrowserRead privilege to gain UniversalXPConnect privileges and possibly execute code or obtain sensitive data by reading into a privileged context.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-0:1.5.0.5-0.el4.1.src", "4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-0:1.5.0.5-0.el4.1.src", "4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-0:1.5.0.5-0.el4.1.src", "4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3809" }, { "category": "external", "summary": "RHBZ#1618169", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618169" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3809", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3809" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3809", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3809" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-29T00:16:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-0:1.5.0.5-0.el4.1.src", "4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-0:1.5.0.5-0.el4.1.src", "4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-0:1.5.0.5-0.el4.1.src", "4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0611" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-3810", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618170" } ], "notes": [ { "category": "description", "text": "Cross-site scripting (XSS) vulnerability in Mozilla Firefox 1.5 before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to inject arbitrary web script or HTML via the XPCNativeWrapper(window).Function construct.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-0:1.5.0.5-0.el4.1.src", "4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-0:1.5.0.5-0.el4.1.src", "4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-0:1.5.0.5-0.el4.1.src", "4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3810" }, { "category": "external", "summary": "RHBZ#1618170", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618170" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3810", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3810" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3810", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3810" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-29T00:16:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-0:1.5.0.5-0.el4.1.src", "4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-0:1.5.0.5-0.el4.1.src", "4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-0:1.5.0.5-0.el4.1.src", "4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0611" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2006-3811", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618171" } ], "notes": [ { "category": "description", "text": "Multiple vulnerabilities in Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via Javascript that leads to memory corruption, including (1) nsListControlFrame::FireMenuItemActiveEvent, (2) buffer overflows in the string class in out-of-memory conditions, (3) table row and column groups, (4) \"anonymous box selectors outside of UA stylesheets,\" (5) stale references to \"removed nodes,\" and (6) running the crypto.generateCRMFRequest callback on deleted context.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-0:1.5.0.5-0.el4.1.src", "4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-0:1.5.0.5-0.el4.1.src", "4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-0:1.5.0.5-0.el4.1.src", "4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3811" }, { "category": "external", "summary": "RHBZ#1618171", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618171" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3811", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3811" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3811", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3811" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-29T00:16:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-0:1.5.0.5-0.el4.1.src", "4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src", "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-0:1.5.0.5-0.el4.1.src", "4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-0:1.5.0.5-0.el4.1.src", "4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0611" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" } ] }
rhsa-2006_0608
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated seamonkey packages that fix several security bugs are now available\nfor Red Hat Enterprise Linux 3.\n\nThis update has been rated as having critical security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "SeaMonkey is an open source Web browser, advanced email and newsgroup\nclient, IRC chat client, and HTML editor.\n\nSeveral flaws were found in the way SeaMonkey processed certain javascript\nactions. A malicious web page could execute arbitrary javascript\ninstructions with the permissions of \"chrome\", allowing the page to steal\nsensitive information or install browser malware. (CVE-2006-3807,\nCVE-2006-3809, CVE-2006-3812)\n\nSeveral denial of service flaws were found in the way SeaMonkey processed\ncertain web content. A malicious web page could crash the browser or\npossibly execute arbitrary code as the user running SeaMonkey.\n(CVE-2006-3801, CVE-2006-3677, CVE-2006-3113, CVE-2006-3803, CVE-2006-3805,\nCVE-2006-3806, CVE-2006-3811)\n\nA buffer overflow flaw was found in the way SeaMonkey Messenger displayed\nmalformed inline vcard attachments. If a victim viewed an email message\ncontaining a carefully crafted vcard, it was possible to execute arbitrary\ncode as the user running SeaMonkey Messenger. (CVE-2006-3804)\n\nSeveral flaws were found in the way SeaMonkey processed certain javascript\nactions. A malicious web page could conduct a cross-site scripting attack\nor steal sensitive information (such as cookies owned by other domains).\n(CVE-2006-3802, CVE-2006-3810)\n\nA flaw was found in the way SeaMonkey processed Proxy AutoConfig scripts. A\nmalicious Proxy AutoConfig server could execute arbitrary javascript\ninstructions with the permissions of \"chrome\", allowing the page to steal\nsensitive information or install browser malware. (CVE-2006-3808)\n\nUsers of SeaMonkey are advised to upgrade to this update, which contains\nSeaMonkey version 1.0.3 that corrects these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2006:0608", "url": "https://access.redhat.com/errata/RHSA-2006:0608" }, { "category": "external", "summary": "http://www.redhat.com/security/updates/classification/#critical", "url": "http://www.redhat.com/security/updates/classification/#critical" }, { "category": "external", "summary": "200253", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=200253" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2006/rhsa-2006_0608.json" } ], "title": "Red Hat Security Advisory: seamonkey security update", "tracking": { "current_release_date": "2024-11-22T00:27:09+00:00", "generator": { "date": "2024-11-22T00:27:09+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2006:0608", "initial_release_date": "2006-07-27T19:53:00+00:00", "revision_history": [ { "date": "2006-07-27T19:53:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2006-07-27T00:00:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T00:27:09+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 3", "product": { "name": "Red Hat Enterprise Linux AS version 3", "product_id": "3AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::as" } } }, { "category": "product_name", "name": "Red Hat Desktop version 3", "product": { "name": "Red Hat Desktop version 3", "product_id": "3Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 3", "product": { "name": "Red Hat Enterprise Linux ES version 3", "product_id": "3ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 3", "product": { "name": "Red Hat Enterprise Linux WS version 3", "product_id": "3WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::ws" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "product": { "name": "seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "product_id": "seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nspr@1.0.3-0.el3.1?arch=ia64" } } }, { "category": "product_version", "name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "product": { "name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "product_id": "seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nss-devel@1.0.3-0.el3.1?arch=ia64" } } }, { "category": "product_version", "name": "seamonkey-devel-0:1.0.3-0.el3.1.ia64", "product": { "name": "seamonkey-devel-0:1.0.3-0.el3.1.ia64", "product_id": "seamonkey-devel-0:1.0.3-0.el3.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-devel@1.0.3-0.el3.1?arch=ia64" } } }, { "category": "product_version", "name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "product": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "product_id": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-dom-inspector@1.0.3-0.el3.1?arch=ia64" } } }, { "category": "product_version", "name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "product": { "name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "product_id": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nspr-devel@1.0.3-0.el3.1?arch=ia64" } } }, { "category": "product_version", "name": "seamonkey-0:1.0.3-0.el3.1.ia64", "product": { "name": "seamonkey-0:1.0.3-0.el3.1.ia64", "product_id": "seamonkey-0:1.0.3-0.el3.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey@1.0.3-0.el3.1?arch=ia64" } } }, { "category": "product_version", "name": "seamonkey-chat-0:1.0.3-0.el3.1.ia64", "product": { "name": "seamonkey-chat-0:1.0.3-0.el3.1.ia64", "product_id": "seamonkey-chat-0:1.0.3-0.el3.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-chat@1.0.3-0.el3.1?arch=ia64" } } }, { "category": "product_version", "name": "seamonkey-nss-0:1.0.3-0.el3.1.ia64", "product": { "name": "seamonkey-nss-0:1.0.3-0.el3.1.ia64", "product_id": "seamonkey-nss-0:1.0.3-0.el3.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nss@1.0.3-0.el3.1?arch=ia64" } } }, { "category": "product_version", "name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "product": { "name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "product_id": "seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-debuginfo@1.0.3-0.el3.1?arch=ia64" } } }, { "category": "product_version", "name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "product": { "name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "product_id": "seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-js-debugger@1.0.3-0.el3.1?arch=ia64" } } }, { "category": "product_version", "name": "seamonkey-mail-0:1.0.3-0.el3.1.ia64", "product": { "name": "seamonkey-mail-0:1.0.3-0.el3.1.ia64", "product_id": "seamonkey-mail-0:1.0.3-0.el3.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-mail@1.0.3-0.el3.1?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "seamonkey-nspr-0:1.0.3-0.el3.1.i386", "product": { "name": "seamonkey-nspr-0:1.0.3-0.el3.1.i386", "product_id": "seamonkey-nspr-0:1.0.3-0.el3.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nspr@1.0.3-0.el3.1?arch=i386" } } }, { "category": "product_version", "name": "seamonkey-nss-0:1.0.3-0.el3.1.i386", "product": { "name": "seamonkey-nss-0:1.0.3-0.el3.1.i386", "product_id": "seamonkey-nss-0:1.0.3-0.el3.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nss@1.0.3-0.el3.1?arch=i386" } } }, { "category": "product_version", "name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "product": { "name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "product_id": "seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-debuginfo@1.0.3-0.el3.1?arch=i386" } } }, { "category": "product_version", "name": "seamonkey-0:1.0.3-0.el3.1.i386", "product": { "name": "seamonkey-0:1.0.3-0.el3.1.i386", "product_id": "seamonkey-0:1.0.3-0.el3.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey@1.0.3-0.el3.1?arch=i386" } } }, { "category": "product_version", "name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "product": { "name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "product_id": "seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nss-devel@1.0.3-0.el3.1?arch=i386" } } }, { "category": "product_version", "name": "seamonkey-devel-0:1.0.3-0.el3.1.i386", "product": { "name": "seamonkey-devel-0:1.0.3-0.el3.1.i386", "product_id": "seamonkey-devel-0:1.0.3-0.el3.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-devel@1.0.3-0.el3.1?arch=i386" } } }, { "category": "product_version", "name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "product": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "product_id": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-dom-inspector@1.0.3-0.el3.1?arch=i386" } } }, { "category": "product_version", "name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "product": { "name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "product_id": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nspr-devel@1.0.3-0.el3.1?arch=i386" } } }, { "category": "product_version", "name": "seamonkey-chat-0:1.0.3-0.el3.1.i386", "product": { "name": "seamonkey-chat-0:1.0.3-0.el3.1.i386", "product_id": "seamonkey-chat-0:1.0.3-0.el3.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-chat@1.0.3-0.el3.1?arch=i386" } } }, { "category": "product_version", "name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "product": { "name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "product_id": "seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-js-debugger@1.0.3-0.el3.1?arch=i386" } } }, { "category": "product_version", "name": "seamonkey-mail-0:1.0.3-0.el3.1.i386", "product": { "name": "seamonkey-mail-0:1.0.3-0.el3.1.i386", "product_id": "seamonkey-mail-0:1.0.3-0.el3.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-mail@1.0.3-0.el3.1?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "product": { "name": "seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "product_id": "seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nspr@1.0.3-0.el3.1?arch=x86_64" } } }, { "category": "product_version", "name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "product": { "name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "product_id": "seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nss-devel@1.0.3-0.el3.1?arch=x86_64" } } }, { "category": "product_version", "name": "seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "product": { "name": "seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "product_id": "seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-devel@1.0.3-0.el3.1?arch=x86_64" } } }, { "category": "product_version", "name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "product": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "product_id": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-dom-inspector@1.0.3-0.el3.1?arch=x86_64" } } }, { "category": "product_version", "name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "product": { "name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "product_id": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nspr-devel@1.0.3-0.el3.1?arch=x86_64" } } }, { "category": "product_version", "name": "seamonkey-0:1.0.3-0.el3.1.x86_64", "product": { "name": "seamonkey-0:1.0.3-0.el3.1.x86_64", "product_id": "seamonkey-0:1.0.3-0.el3.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey@1.0.3-0.el3.1?arch=x86_64" } } }, { "category": "product_version", "name": "seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "product": { "name": "seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "product_id": "seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-chat@1.0.3-0.el3.1?arch=x86_64" } } }, { "category": "product_version", "name": "seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "product": { "name": "seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "product_id": "seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nss@1.0.3-0.el3.1?arch=x86_64" } } }, { "category": "product_version", "name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "product": { "name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "product_id": "seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-debuginfo@1.0.3-0.el3.1?arch=x86_64" } } }, { "category": "product_version", "name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "product": { "name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "product_id": "seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-js-debugger@1.0.3-0.el3.1?arch=x86_64" } } }, { "category": "product_version", "name": "seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "product": { "name": "seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "product_id": "seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-mail@1.0.3-0.el3.1?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "seamonkey-0:1.0.3-0.el3.1.src", "product": { "name": "seamonkey-0:1.0.3-0.el3.1.src", "product_id": "seamonkey-0:1.0.3-0.el3.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey@1.0.3-0.el3.1?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "product": { "name": "seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "product_id": "seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nspr@1.0.3-0.el3.1?arch=ppc" } } }, { "category": "product_version", "name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "product": { "name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "product_id": "seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nss-devel@1.0.3-0.el3.1?arch=ppc" } } }, { "category": "product_version", "name": "seamonkey-devel-0:1.0.3-0.el3.1.ppc", "product": { "name": "seamonkey-devel-0:1.0.3-0.el3.1.ppc", "product_id": "seamonkey-devel-0:1.0.3-0.el3.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-devel@1.0.3-0.el3.1?arch=ppc" } } }, { "category": "product_version", "name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "product": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "product_id": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-dom-inspector@1.0.3-0.el3.1?arch=ppc" } } }, { "category": "product_version", "name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "product": { "name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "product_id": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nspr-devel@1.0.3-0.el3.1?arch=ppc" } } }, { "category": "product_version", "name": "seamonkey-0:1.0.3-0.el3.1.ppc", "product": { "name": "seamonkey-0:1.0.3-0.el3.1.ppc", "product_id": "seamonkey-0:1.0.3-0.el3.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey@1.0.3-0.el3.1?arch=ppc" } } }, { "category": "product_version", "name": "seamonkey-chat-0:1.0.3-0.el3.1.ppc", "product": { "name": "seamonkey-chat-0:1.0.3-0.el3.1.ppc", "product_id": "seamonkey-chat-0:1.0.3-0.el3.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-chat@1.0.3-0.el3.1?arch=ppc" } } }, { "category": "product_version", "name": "seamonkey-nss-0:1.0.3-0.el3.1.ppc", "product": { "name": "seamonkey-nss-0:1.0.3-0.el3.1.ppc", "product_id": "seamonkey-nss-0:1.0.3-0.el3.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nss@1.0.3-0.el3.1?arch=ppc" } } }, { "category": "product_version", "name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "product": { "name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "product_id": "seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-debuginfo@1.0.3-0.el3.1?arch=ppc" } } }, { "category": "product_version", "name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "product": { "name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "product_id": "seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-js-debugger@1.0.3-0.el3.1?arch=ppc" } } }, { "category": "product_version", "name": "seamonkey-mail-0:1.0.3-0.el3.1.ppc", "product": { "name": "seamonkey-mail-0:1.0.3-0.el3.1.ppc", "product_id": "seamonkey-mail-0:1.0.3-0.el3.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-mail@1.0.3-0.el3.1?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "product": { "name": "seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "product_id": "seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nspr@1.0.3-0.el3.1?arch=s390x" } } }, { "category": "product_version", "name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "product": { "name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "product_id": "seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nss-devel@1.0.3-0.el3.1?arch=s390x" } } }, { "category": "product_version", "name": "seamonkey-devel-0:1.0.3-0.el3.1.s390x", "product": { "name": "seamonkey-devel-0:1.0.3-0.el3.1.s390x", "product_id": "seamonkey-devel-0:1.0.3-0.el3.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-devel@1.0.3-0.el3.1?arch=s390x" } } }, { "category": "product_version", "name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "product": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "product_id": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-dom-inspector@1.0.3-0.el3.1?arch=s390x" } } }, { "category": "product_version", "name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "product": { "name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "product_id": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nspr-devel@1.0.3-0.el3.1?arch=s390x" } } }, { "category": "product_version", "name": "seamonkey-0:1.0.3-0.el3.1.s390x", "product": { "name": "seamonkey-0:1.0.3-0.el3.1.s390x", "product_id": "seamonkey-0:1.0.3-0.el3.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey@1.0.3-0.el3.1?arch=s390x" } } }, { "category": "product_version", "name": "seamonkey-chat-0:1.0.3-0.el3.1.s390x", "product": { "name": "seamonkey-chat-0:1.0.3-0.el3.1.s390x", "product_id": "seamonkey-chat-0:1.0.3-0.el3.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-chat@1.0.3-0.el3.1?arch=s390x" } } }, { "category": "product_version", "name": "seamonkey-nss-0:1.0.3-0.el3.1.s390x", "product": { "name": "seamonkey-nss-0:1.0.3-0.el3.1.s390x", "product_id": "seamonkey-nss-0:1.0.3-0.el3.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nss@1.0.3-0.el3.1?arch=s390x" } } }, { "category": "product_version", "name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "product": { "name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "product_id": "seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-debuginfo@1.0.3-0.el3.1?arch=s390x" } } }, { "category": "product_version", "name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "product": { "name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "product_id": "seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-js-debugger@1.0.3-0.el3.1?arch=s390x" } } }, { "category": "product_version", "name": "seamonkey-mail-0:1.0.3-0.el3.1.s390x", "product": { "name": "seamonkey-mail-0:1.0.3-0.el3.1.s390x", "product_id": "seamonkey-mail-0:1.0.3-0.el3.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-mail@1.0.3-0.el3.1?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "seamonkey-nspr-0:1.0.3-0.el3.1.s390", "product": { "name": "seamonkey-nspr-0:1.0.3-0.el3.1.s390", "product_id": "seamonkey-nspr-0:1.0.3-0.el3.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nspr@1.0.3-0.el3.1?arch=s390" } } }, { "category": "product_version", "name": "seamonkey-nss-0:1.0.3-0.el3.1.s390", "product": { "name": "seamonkey-nss-0:1.0.3-0.el3.1.s390", "product_id": "seamonkey-nss-0:1.0.3-0.el3.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nss@1.0.3-0.el3.1?arch=s390" } } }, { "category": "product_version", "name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "product": { "name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "product_id": "seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-debuginfo@1.0.3-0.el3.1?arch=s390" } } }, { "category": "product_version", "name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "product": { "name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "product_id": "seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nss-devel@1.0.3-0.el3.1?arch=s390" } } }, { "category": "product_version", "name": "seamonkey-devel-0:1.0.3-0.el3.1.s390", "product": { "name": "seamonkey-devel-0:1.0.3-0.el3.1.s390", "product_id": "seamonkey-devel-0:1.0.3-0.el3.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-devel@1.0.3-0.el3.1?arch=s390" } } }, { "category": "product_version", "name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "product": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "product_id": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-dom-inspector@1.0.3-0.el3.1?arch=s390" } } }, { "category": "product_version", "name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "product": { "name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "product_id": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nspr-devel@1.0.3-0.el3.1?arch=s390" } } }, { "category": "product_version", "name": "seamonkey-0:1.0.3-0.el3.1.s390", "product": { "name": "seamonkey-0:1.0.3-0.el3.1.s390", "product_id": "seamonkey-0:1.0.3-0.el3.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey@1.0.3-0.el3.1?arch=s390" } } }, { "category": "product_version", "name": "seamonkey-chat-0:1.0.3-0.el3.1.s390", "product": { "name": "seamonkey-chat-0:1.0.3-0.el3.1.s390", "product_id": "seamonkey-chat-0:1.0.3-0.el3.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-chat@1.0.3-0.el3.1?arch=s390" } } }, { "category": "product_version", "name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "product": { "name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "product_id": "seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-js-debugger@1.0.3-0.el3.1?arch=s390" } } }, { "category": "product_version", "name": "seamonkey-mail-0:1.0.3-0.el3.1.s390", "product": { "name": "seamonkey-mail-0:1.0.3-0.el3.1.s390", "product_id": "seamonkey-mail-0:1.0.3-0.el3.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-mail@1.0.3-0.el3.1?arch=s390" } } } ], "category": "architecture", "name": "s390" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-0:1.0.3-0.el3.1.i386" }, "product_reference": "seamonkey-0:1.0.3-0.el3.1.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-0:1.0.3-0.el3.1.ia64" }, "product_reference": "seamonkey-0:1.0.3-0.el3.1.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-0:1.0.3-0.el3.1.ppc" }, "product_reference": "seamonkey-0:1.0.3-0.el3.1.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-0:1.0.3-0.el3.1.s390" }, "product_reference": "seamonkey-0:1.0.3-0.el3.1.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-0:1.0.3-0.el3.1.s390x" }, "product_reference": "seamonkey-0:1.0.3-0.el3.1.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el3.1.src as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-0:1.0.3-0.el3.1.src" }, "product_reference": "seamonkey-0:1.0.3-0.el3.1.src", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-0:1.0.3-0.el3.1.x86_64" }, "product_reference": "seamonkey-0:1.0.3-0.el3.1.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-chat-0:1.0.3-0.el3.1.i386" }, "product_reference": "seamonkey-chat-0:1.0.3-0.el3.1.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ia64" }, "product_reference": "seamonkey-chat-0:1.0.3-0.el3.1.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ppc" }, "product_reference": "seamonkey-chat-0:1.0.3-0.el3.1.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390" }, "product_reference": "seamonkey-chat-0:1.0.3-0.el3.1.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390x" }, "product_reference": "seamonkey-chat-0:1.0.3-0.el3.1.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64" }, "product_reference": "seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386" }, "product_reference": "seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64" }, "product_reference": "seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc" }, "product_reference": "seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390" }, "product_reference": "seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x" }, "product_reference": "seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64" }, "product_reference": "seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-devel-0:1.0.3-0.el3.1.i386" }, "product_reference": "seamonkey-devel-0:1.0.3-0.el3.1.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ia64" }, "product_reference": "seamonkey-devel-0:1.0.3-0.el3.1.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ppc" }, "product_reference": "seamonkey-devel-0:1.0.3-0.el3.1.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390" }, "product_reference": "seamonkey-devel-0:1.0.3-0.el3.1.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390x" }, "product_reference": "seamonkey-devel-0:1.0.3-0.el3.1.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64" }, "product_reference": "seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386" }, "product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64" }, "product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc" }, "product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390" }, "product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x" }, "product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64" }, "product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386" }, "product_reference": "seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64" }, "product_reference": "seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc" }, "product_reference": "seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390" }, "product_reference": "seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x" }, "product_reference": "seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64" }, "product_reference": "seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-mail-0:1.0.3-0.el3.1.i386" }, "product_reference": "seamonkey-mail-0:1.0.3-0.el3.1.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ia64" }, "product_reference": "seamonkey-mail-0:1.0.3-0.el3.1.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ppc" }, "product_reference": "seamonkey-mail-0:1.0.3-0.el3.1.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390" }, "product_reference": "seamonkey-mail-0:1.0.3-0.el3.1.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390x" }, "product_reference": "seamonkey-mail-0:1.0.3-0.el3.1.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64" }, "product_reference": "seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.i386" }, "product_reference": "seamonkey-nspr-0:1.0.3-0.el3.1.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64" }, "product_reference": "seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc" }, "product_reference": "seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390" }, "product_reference": "seamonkey-nspr-0:1.0.3-0.el3.1.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x" }, "product_reference": "seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64" }, "product_reference": "seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386" }, "product_reference": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64" }, "product_reference": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc" }, "product_reference": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390" }, "product_reference": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x" }, "product_reference": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64" }, "product_reference": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nss-0:1.0.3-0.el3.1.i386" }, "product_reference": "seamonkey-nss-0:1.0.3-0.el3.1.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ia64" }, "product_reference": "seamonkey-nss-0:1.0.3-0.el3.1.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ppc" }, "product_reference": "seamonkey-nss-0:1.0.3-0.el3.1.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390" }, "product_reference": "seamonkey-nss-0:1.0.3-0.el3.1.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390x" }, "product_reference": "seamonkey-nss-0:1.0.3-0.el3.1.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64" }, "product_reference": "seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386" }, "product_reference": "seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64" }, "product_reference": "seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc" }, "product_reference": "seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390" }, "product_reference": "seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x" }, "product_reference": "seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64" }, "product_reference": "seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el3.1.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-0:1.0.3-0.el3.1.i386" }, "product_reference": "seamonkey-0:1.0.3-0.el3.1.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-0:1.0.3-0.el3.1.ia64" }, "product_reference": "seamonkey-0:1.0.3-0.el3.1.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el3.1.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-0:1.0.3-0.el3.1.ppc" }, "product_reference": "seamonkey-0:1.0.3-0.el3.1.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el3.1.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390" }, "product_reference": "seamonkey-0:1.0.3-0.el3.1.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el3.1.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390x" }, "product_reference": "seamonkey-0:1.0.3-0.el3.1.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el3.1.src as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-0:1.0.3-0.el3.1.src" }, "product_reference": "seamonkey-0:1.0.3-0.el3.1.src", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-0:1.0.3-0.el3.1.x86_64" }, "product_reference": "seamonkey-0:1.0.3-0.el3.1.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.3-0.el3.1.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.i386" }, "product_reference": "seamonkey-chat-0:1.0.3-0.el3.1.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ia64" }, "product_reference": "seamonkey-chat-0:1.0.3-0.el3.1.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.3-0.el3.1.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ppc" }, "product_reference": "seamonkey-chat-0:1.0.3-0.el3.1.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.3-0.el3.1.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390" }, "product_reference": "seamonkey-chat-0:1.0.3-0.el3.1.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.3-0.el3.1.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390x" }, "product_reference": "seamonkey-chat-0:1.0.3-0.el3.1.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.x86_64" }, "product_reference": "seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386" }, "product_reference": "seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64" }, "product_reference": "seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc" }, "product_reference": "seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390" }, "product_reference": "seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x" }, "product_reference": "seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64" }, "product_reference": "seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.3-0.el3.1.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.i386" }, "product_reference": "seamonkey-devel-0:1.0.3-0.el3.1.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ia64" }, "product_reference": "seamonkey-devel-0:1.0.3-0.el3.1.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.3-0.el3.1.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ppc" }, "product_reference": "seamonkey-devel-0:1.0.3-0.el3.1.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.3-0.el3.1.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390" }, "product_reference": "seamonkey-devel-0:1.0.3-0.el3.1.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.3-0.el3.1.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390x" }, "product_reference": "seamonkey-devel-0:1.0.3-0.el3.1.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.x86_64" }, "product_reference": "seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386" }, "product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64" }, "product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc" }, "product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390" }, "product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x" }, "product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64" }, "product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386" }, "product_reference": "seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64" }, "product_reference": "seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc" }, "product_reference": "seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390" }, "product_reference": "seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x" }, "product_reference": "seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64" }, "product_reference": "seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.3-0.el3.1.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.i386" }, "product_reference": "seamonkey-mail-0:1.0.3-0.el3.1.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ia64" }, "product_reference": "seamonkey-mail-0:1.0.3-0.el3.1.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.3-0.el3.1.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ppc" }, "product_reference": "seamonkey-mail-0:1.0.3-0.el3.1.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.3-0.el3.1.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390" }, "product_reference": "seamonkey-mail-0:1.0.3-0.el3.1.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.3-0.el3.1.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390x" }, "product_reference": "seamonkey-mail-0:1.0.3-0.el3.1.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.x86_64" }, "product_reference": "seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.3-0.el3.1.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.i386" }, "product_reference": "seamonkey-nspr-0:1.0.3-0.el3.1.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ia64" }, "product_reference": "seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.3-0.el3.1.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ppc" }, "product_reference": "seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.3-0.el3.1.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390" }, "product_reference": "seamonkey-nspr-0:1.0.3-0.el3.1.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.3-0.el3.1.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390x" }, "product_reference": "seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64" }, "product_reference": "seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386" }, "product_reference": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64" }, "product_reference": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc" }, "product_reference": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390" }, "product_reference": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x" }, "product_reference": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64" }, "product_reference": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.3-0.el3.1.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.i386" }, "product_reference": "seamonkey-nss-0:1.0.3-0.el3.1.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ia64" }, "product_reference": "seamonkey-nss-0:1.0.3-0.el3.1.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.3-0.el3.1.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ppc" }, "product_reference": "seamonkey-nss-0:1.0.3-0.el3.1.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.3-0.el3.1.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390" }, "product_reference": "seamonkey-nss-0:1.0.3-0.el3.1.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.3-0.el3.1.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390x" }, "product_reference": "seamonkey-nss-0:1.0.3-0.el3.1.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.x86_64" }, "product_reference": "seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386" }, "product_reference": "seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64" }, "product_reference": "seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc" }, "product_reference": "seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390" }, "product_reference": "seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x" }, "product_reference": "seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64" }, "product_reference": "seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-0:1.0.3-0.el3.1.i386" }, "product_reference": "seamonkey-0:1.0.3-0.el3.1.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-0:1.0.3-0.el3.1.ia64" }, "product_reference": "seamonkey-0:1.0.3-0.el3.1.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-0:1.0.3-0.el3.1.ppc" }, "product_reference": "seamonkey-0:1.0.3-0.el3.1.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-0:1.0.3-0.el3.1.s390" }, "product_reference": "seamonkey-0:1.0.3-0.el3.1.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-0:1.0.3-0.el3.1.s390x" }, "product_reference": "seamonkey-0:1.0.3-0.el3.1.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el3.1.src as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-0:1.0.3-0.el3.1.src" }, "product_reference": "seamonkey-0:1.0.3-0.el3.1.src", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-0:1.0.3-0.el3.1.x86_64" }, "product_reference": "seamonkey-0:1.0.3-0.el3.1.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-chat-0:1.0.3-0.el3.1.i386" }, "product_reference": "seamonkey-chat-0:1.0.3-0.el3.1.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ia64" }, "product_reference": "seamonkey-chat-0:1.0.3-0.el3.1.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ppc" }, "product_reference": "seamonkey-chat-0:1.0.3-0.el3.1.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390" }, "product_reference": "seamonkey-chat-0:1.0.3-0.el3.1.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390x" }, "product_reference": "seamonkey-chat-0:1.0.3-0.el3.1.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-chat-0:1.0.3-0.el3.1.x86_64" }, "product_reference": "seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386" }, "product_reference": "seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64" }, "product_reference": "seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc" }, "product_reference": "seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390" }, "product_reference": "seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x" }, "product_reference": "seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64" }, "product_reference": "seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-devel-0:1.0.3-0.el3.1.i386" }, "product_reference": "seamonkey-devel-0:1.0.3-0.el3.1.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ia64" }, "product_reference": "seamonkey-devel-0:1.0.3-0.el3.1.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ppc" }, "product_reference": "seamonkey-devel-0:1.0.3-0.el3.1.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390" }, "product_reference": "seamonkey-devel-0:1.0.3-0.el3.1.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390x" }, "product_reference": "seamonkey-devel-0:1.0.3-0.el3.1.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-devel-0:1.0.3-0.el3.1.x86_64" }, "product_reference": "seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386" }, "product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64" }, "product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc" }, "product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390" }, "product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x" }, "product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64" }, "product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386" }, "product_reference": "seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64" }, "product_reference": "seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc" }, "product_reference": "seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390" }, "product_reference": "seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x" }, "product_reference": "seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64" }, "product_reference": "seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-mail-0:1.0.3-0.el3.1.i386" }, "product_reference": "seamonkey-mail-0:1.0.3-0.el3.1.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ia64" }, "product_reference": "seamonkey-mail-0:1.0.3-0.el3.1.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ppc" }, "product_reference": "seamonkey-mail-0:1.0.3-0.el3.1.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390" }, "product_reference": "seamonkey-mail-0:1.0.3-0.el3.1.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390x" }, "product_reference": "seamonkey-mail-0:1.0.3-0.el3.1.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-mail-0:1.0.3-0.el3.1.x86_64" }, "product_reference": "seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.i386" }, "product_reference": "seamonkey-nspr-0:1.0.3-0.el3.1.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ia64" }, "product_reference": "seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ppc" }, "product_reference": "seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390" }, "product_reference": "seamonkey-nspr-0:1.0.3-0.el3.1.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390x" }, "product_reference": "seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64" }, "product_reference": "seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386" }, "product_reference": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64" }, "product_reference": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc" }, "product_reference": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390" }, "product_reference": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x" }, "product_reference": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64" }, "product_reference": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nss-0:1.0.3-0.el3.1.i386" }, "product_reference": "seamonkey-nss-0:1.0.3-0.el3.1.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ia64" }, "product_reference": "seamonkey-nss-0:1.0.3-0.el3.1.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ppc" }, "product_reference": "seamonkey-nss-0:1.0.3-0.el3.1.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390" }, "product_reference": "seamonkey-nss-0:1.0.3-0.el3.1.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390x" }, "product_reference": "seamonkey-nss-0:1.0.3-0.el3.1.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nss-0:1.0.3-0.el3.1.x86_64" }, "product_reference": "seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386" }, "product_reference": "seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64" }, "product_reference": "seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc" }, "product_reference": "seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390" }, "product_reference": "seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x" }, "product_reference": "seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64" }, "product_reference": "seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-0:1.0.3-0.el3.1.i386" }, "product_reference": "seamonkey-0:1.0.3-0.el3.1.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-0:1.0.3-0.el3.1.ia64" }, "product_reference": "seamonkey-0:1.0.3-0.el3.1.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-0:1.0.3-0.el3.1.ppc" }, "product_reference": "seamonkey-0:1.0.3-0.el3.1.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-0:1.0.3-0.el3.1.s390" }, "product_reference": "seamonkey-0:1.0.3-0.el3.1.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-0:1.0.3-0.el3.1.s390x" }, "product_reference": "seamonkey-0:1.0.3-0.el3.1.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el3.1.src as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-0:1.0.3-0.el3.1.src" }, "product_reference": "seamonkey-0:1.0.3-0.el3.1.src", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-0:1.0.3-0.el3.1.x86_64" }, "product_reference": "seamonkey-0:1.0.3-0.el3.1.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-chat-0:1.0.3-0.el3.1.i386" }, "product_reference": "seamonkey-chat-0:1.0.3-0.el3.1.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ia64" }, "product_reference": "seamonkey-chat-0:1.0.3-0.el3.1.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ppc" }, "product_reference": "seamonkey-chat-0:1.0.3-0.el3.1.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390" }, "product_reference": "seamonkey-chat-0:1.0.3-0.el3.1.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390x" }, "product_reference": "seamonkey-chat-0:1.0.3-0.el3.1.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64" }, "product_reference": "seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386" }, "product_reference": "seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64" }, "product_reference": "seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc" }, "product_reference": "seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390" }, "product_reference": "seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x" }, "product_reference": "seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64" }, "product_reference": "seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-devel-0:1.0.3-0.el3.1.i386" }, "product_reference": "seamonkey-devel-0:1.0.3-0.el3.1.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ia64" }, "product_reference": "seamonkey-devel-0:1.0.3-0.el3.1.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ppc" }, "product_reference": "seamonkey-devel-0:1.0.3-0.el3.1.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390" }, "product_reference": "seamonkey-devel-0:1.0.3-0.el3.1.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390x" }, "product_reference": "seamonkey-devel-0:1.0.3-0.el3.1.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64" }, "product_reference": "seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386" }, "product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64" }, "product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc" }, "product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390" }, "product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x" }, "product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64" }, "product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386" }, "product_reference": "seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64" }, "product_reference": "seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc" }, "product_reference": "seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390" }, "product_reference": "seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x" }, "product_reference": "seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64" }, "product_reference": "seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-mail-0:1.0.3-0.el3.1.i386" }, "product_reference": "seamonkey-mail-0:1.0.3-0.el3.1.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ia64" }, "product_reference": "seamonkey-mail-0:1.0.3-0.el3.1.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ppc" }, "product_reference": "seamonkey-mail-0:1.0.3-0.el3.1.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390" }, "product_reference": "seamonkey-mail-0:1.0.3-0.el3.1.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390x" }, "product_reference": "seamonkey-mail-0:1.0.3-0.el3.1.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64" }, "product_reference": "seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.i386" }, "product_reference": "seamonkey-nspr-0:1.0.3-0.el3.1.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64" }, "product_reference": "seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc" }, "product_reference": "seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390" }, "product_reference": "seamonkey-nspr-0:1.0.3-0.el3.1.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x" }, "product_reference": "seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64" }, "product_reference": "seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386" }, "product_reference": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64" }, "product_reference": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc" }, "product_reference": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390" }, "product_reference": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x" }, "product_reference": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64" }, "product_reference": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nss-0:1.0.3-0.el3.1.i386" }, "product_reference": "seamonkey-nss-0:1.0.3-0.el3.1.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ia64" }, "product_reference": "seamonkey-nss-0:1.0.3-0.el3.1.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ppc" }, "product_reference": "seamonkey-nss-0:1.0.3-0.el3.1.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390" }, "product_reference": "seamonkey-nss-0:1.0.3-0.el3.1.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390x" }, "product_reference": "seamonkey-nss-0:1.0.3-0.el3.1.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64" }, "product_reference": "seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386" }, "product_reference": "seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64" }, "product_reference": "seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc" }, "product_reference": "seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390" }, "product_reference": "seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x" }, "product_reference": "seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64" }, "product_reference": "seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "relates_to_product_reference": "3WS" } ] }, "vulnerabilities": [ { "cve": "CVE-2006-3113", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618135" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox 1.5 before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via simultaneous XPCOM events, which causes a timer object to be deleted in a way that triggers memory corruption.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:seamonkey-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-0:1.0.3-0.el3.1.src", "3AS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-0:1.0.3-0.el3.1.src", "3Desktop:seamonkey-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-0:1.0.3-0.el3.1.src", "3ES:seamonkey-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-0:1.0.3-0.el3.1.src", "3WS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3113" }, { "category": "external", "summary": "RHBZ#1618135", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618135" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3113", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3113" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3113", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3113" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-27T19:53:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "3AS:seamonkey-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-0:1.0.3-0.el3.1.src", "3AS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-0:1.0.3-0.el3.1.src", "3Desktop:seamonkey-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-0:1.0.3-0.el3.1.src", "3ES:seamonkey-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-0:1.0.3-0.el3.1.src", "3WS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0608" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-3677", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618153" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox 1.5 before 1.5.0.5 and SeaMonkey before 1.0.3 allows remote attackers to execute arbitrary code by changing certain properties of the window navigator object (window.navigator) that are accessed when Java starts up, which causes a crash that leads to code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:seamonkey-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-0:1.0.3-0.el3.1.src", "3AS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-0:1.0.3-0.el3.1.src", "3Desktop:seamonkey-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-0:1.0.3-0.el3.1.src", "3ES:seamonkey-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-0:1.0.3-0.el3.1.src", "3WS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3677" }, { "category": "external", "summary": "RHBZ#1618153", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618153" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3677", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3677" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3677", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3677" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-27T19:53:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "3AS:seamonkey-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-0:1.0.3-0.el3.1.src", "3AS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-0:1.0.3-0.el3.1.src", "3Desktop:seamonkey-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-0:1.0.3-0.el3.1.src", "3ES:seamonkey-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-0:1.0.3-0.el3.1.src", "3WS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0608" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-3801", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618161" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox 1.5 before 1.5.0.5 and SeaMonkey before 1.0.3 does not properly clear a JavaScript reference to a frame or window, which leaves a pointer to a deleted object that allows remote attackers to execute arbitrary native code.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:seamonkey-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-0:1.0.3-0.el3.1.src", "3AS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-0:1.0.3-0.el3.1.src", "3Desktop:seamonkey-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-0:1.0.3-0.el3.1.src", "3ES:seamonkey-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-0:1.0.3-0.el3.1.src", "3WS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3801" }, { "category": "external", "summary": "RHBZ#1618161", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618161" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3801", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3801" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3801", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3801" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-27T19:53:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "3AS:seamonkey-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-0:1.0.3-0.el3.1.src", "3AS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-0:1.0.3-0.el3.1.src", "3Desktop:seamonkey-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-0:1.0.3-0.el3.1.src", "3ES:seamonkey-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-0:1.0.3-0.el3.1.src", "3WS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0608" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-3802", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618162" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to hijack native DOM methods from objects in another domain and conduct cross-site scripting (XSS) attacks using DOM methods of the top-level object.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:seamonkey-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-0:1.0.3-0.el3.1.src", "3AS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-0:1.0.3-0.el3.1.src", "3Desktop:seamonkey-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-0:1.0.3-0.el3.1.src", "3ES:seamonkey-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-0:1.0.3-0.el3.1.src", "3WS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3802" }, { "category": "external", "summary": "RHBZ#1618162", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618162" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3802", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3802" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3802", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3802" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-27T19:53:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "3AS:seamonkey-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-0:1.0.3-0.el3.1.src", "3AS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-0:1.0.3-0.el3.1.src", "3Desktop:seamonkey-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-0:1.0.3-0.el3.1.src", "3ES:seamonkey-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-0:1.0.3-0.el3.1.src", "3WS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0608" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2006-3803", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618163" } ], "notes": [ { "category": "description", "text": "Race condition in the JavaScript garbage collection in Mozilla Firefox 1.5 before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 might allow remote attackers to execute arbitrary code by causing the garbage collector to delete a temporary variable while it is still being used during the creation of a new Function object.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:seamonkey-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-0:1.0.3-0.el3.1.src", "3AS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-0:1.0.3-0.el3.1.src", "3Desktop:seamonkey-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-0:1.0.3-0.el3.1.src", "3ES:seamonkey-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-0:1.0.3-0.el3.1.src", "3WS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3803" }, { "category": "external", "summary": "RHBZ#1618163", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618163" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3803", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3803" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3803", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3803" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-27T19:53:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "3AS:seamonkey-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-0:1.0.3-0.el3.1.src", "3AS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-0:1.0.3-0.el3.1.src", "3Desktop:seamonkey-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-0:1.0.3-0.el3.1.src", "3ES:seamonkey-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-0:1.0.3-0.el3.1.src", "3WS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0608" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-3804", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618164" } ], "notes": [ { "category": "description", "text": "Heap-based buffer overflow in Mozilla Thunderbird before 1.5.0.5 and SeaMonkey before 1.0.3 allows remote attackers to cause a denial of service (crash) via a VCard attachment with a malformed base64 field, which copies more data than expected due to an integer underflow.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:seamonkey-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-0:1.0.3-0.el3.1.src", "3AS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-0:1.0.3-0.el3.1.src", "3Desktop:seamonkey-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-0:1.0.3-0.el3.1.src", "3ES:seamonkey-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-0:1.0.3-0.el3.1.src", "3WS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3804" }, { "category": "external", "summary": "RHBZ#1618164", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618164" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3804", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3804" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3804", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3804" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-27T19:53:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "3AS:seamonkey-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-0:1.0.3-0.el3.1.src", "3AS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-0:1.0.3-0.el3.1.src", "3Desktop:seamonkey-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-0:1.0.3-0.el3.1.src", "3ES:seamonkey-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-0:1.0.3-0.el3.1.src", "3WS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0608" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-3805", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618165" } ], "notes": [ { "category": "description", "text": "The Javascript engine in Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 might allow remote attackers to execute arbitrary code via vectors involving garbage collection that causes deletion of a temporary object that is still being used.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:seamonkey-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-0:1.0.3-0.el3.1.src", "3AS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-0:1.0.3-0.el3.1.src", "3Desktop:seamonkey-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-0:1.0.3-0.el3.1.src", "3ES:seamonkey-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-0:1.0.3-0.el3.1.src", "3WS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3805" }, { "category": "external", "summary": "RHBZ#1618165", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618165" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3805", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3805" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3805", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3805" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-27T19:53:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "3AS:seamonkey-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-0:1.0.3-0.el3.1.src", "3AS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-0:1.0.3-0.el3.1.src", "3Desktop:seamonkey-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-0:1.0.3-0.el3.1.src", "3ES:seamonkey-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-0:1.0.3-0.el3.1.src", "3WS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0608" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-3806", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618166" } ], "notes": [ { "category": "description", "text": "Multiple integer overflows in the Javascript engine in Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 might allow remote attackers to execute arbitrary code via vectors involving (1) long strings in the toSource method of the Object, Array, and String objects; and (2) unspecified \"string function arguments.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:seamonkey-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-0:1.0.3-0.el3.1.src", "3AS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-0:1.0.3-0.el3.1.src", "3Desktop:seamonkey-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-0:1.0.3-0.el3.1.src", "3ES:seamonkey-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-0:1.0.3-0.el3.1.src", "3WS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3806" }, { "category": "external", "summary": "RHBZ#1618166", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618166" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3806", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3806" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3806", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3806" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-27T19:53:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "3AS:seamonkey-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-0:1.0.3-0.el3.1.src", "3AS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-0:1.0.3-0.el3.1.src", "3Desktop:seamonkey-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-0:1.0.3-0.el3.1.src", "3ES:seamonkey-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-0:1.0.3-0.el3.1.src", "3WS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0608" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-3807", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618167" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to execute arbitrary code via script that changes the standard Object() constructor to return a reference to a privileged object and calling \"named JavaScript functions\" that use the constructor.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:seamonkey-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-0:1.0.3-0.el3.1.src", "3AS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-0:1.0.3-0.el3.1.src", "3Desktop:seamonkey-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-0:1.0.3-0.el3.1.src", "3ES:seamonkey-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-0:1.0.3-0.el3.1.src", "3WS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3807" }, { "category": "external", "summary": "RHBZ#1618167", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618167" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3807", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3807" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3807", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3807" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-27T19:53:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "3AS:seamonkey-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-0:1.0.3-0.el3.1.src", "3AS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-0:1.0.3-0.el3.1.src", "3Desktop:seamonkey-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-0:1.0.3-0.el3.1.src", "3ES:seamonkey-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-0:1.0.3-0.el3.1.src", "3WS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0608" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-3808", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618168" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox before 1.5.0.5 and SeaMonkey before 1.0.3 allows remote Proxy AutoConfig (PAC) servers to execute code with elevated privileges via a PAC script that sets the FindProxyForURL function to an eval method on a privileged object.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:seamonkey-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-0:1.0.3-0.el3.1.src", "3AS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-0:1.0.3-0.el3.1.src", "3Desktop:seamonkey-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-0:1.0.3-0.el3.1.src", "3ES:seamonkey-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-0:1.0.3-0.el3.1.src", "3WS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3808" }, { "category": "external", "summary": "RHBZ#1618168", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618168" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3808", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3808" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3808", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3808" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-27T19:53:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "3AS:seamonkey-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-0:1.0.3-0.el3.1.src", "3AS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-0:1.0.3-0.el3.1.src", "3Desktop:seamonkey-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-0:1.0.3-0.el3.1.src", "3ES:seamonkey-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-0:1.0.3-0.el3.1.src", "3WS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0608" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2006-3809", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618169" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows scripts with the UniversalBrowserRead privilege to gain UniversalXPConnect privileges and possibly execute code or obtain sensitive data by reading into a privileged context.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:seamonkey-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-0:1.0.3-0.el3.1.src", "3AS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-0:1.0.3-0.el3.1.src", "3Desktop:seamonkey-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-0:1.0.3-0.el3.1.src", "3ES:seamonkey-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-0:1.0.3-0.el3.1.src", "3WS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3809" }, { "category": "external", "summary": "RHBZ#1618169", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618169" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3809", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3809" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3809", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3809" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-27T19:53:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "3AS:seamonkey-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-0:1.0.3-0.el3.1.src", "3AS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-0:1.0.3-0.el3.1.src", "3Desktop:seamonkey-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-0:1.0.3-0.el3.1.src", "3ES:seamonkey-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-0:1.0.3-0.el3.1.src", "3WS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0608" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-3810", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618170" } ], "notes": [ { "category": "description", "text": "Cross-site scripting (XSS) vulnerability in Mozilla Firefox 1.5 before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to inject arbitrary web script or HTML via the XPCNativeWrapper(window).Function construct.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:seamonkey-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-0:1.0.3-0.el3.1.src", "3AS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-0:1.0.3-0.el3.1.src", "3Desktop:seamonkey-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-0:1.0.3-0.el3.1.src", "3ES:seamonkey-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-0:1.0.3-0.el3.1.src", "3WS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3810" }, { "category": "external", "summary": "RHBZ#1618170", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618170" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3810", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3810" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3810", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3810" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-27T19:53:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "3AS:seamonkey-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-0:1.0.3-0.el3.1.src", "3AS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-0:1.0.3-0.el3.1.src", "3Desktop:seamonkey-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-0:1.0.3-0.el3.1.src", "3ES:seamonkey-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-0:1.0.3-0.el3.1.src", "3WS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0608" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2006-3811", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618171" } ], "notes": [ { "category": "description", "text": "Multiple vulnerabilities in Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via Javascript that leads to memory corruption, including (1) nsListControlFrame::FireMenuItemActiveEvent, (2) buffer overflows in the string class in out-of-memory conditions, (3) table row and column groups, (4) \"anonymous box selectors outside of UA stylesheets,\" (5) stale references to \"removed nodes,\" and (6) running the crypto.generateCRMFRequest callback on deleted context.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:seamonkey-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-0:1.0.3-0.el3.1.src", "3AS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-0:1.0.3-0.el3.1.src", "3Desktop:seamonkey-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-0:1.0.3-0.el3.1.src", "3ES:seamonkey-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-0:1.0.3-0.el3.1.src", "3WS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3811" }, { "category": "external", "summary": "RHBZ#1618171", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618171" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3811", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3811" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3811", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3811" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-27T19:53:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "3AS:seamonkey-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-0:1.0.3-0.el3.1.src", "3AS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-0:1.0.3-0.el3.1.src", "3Desktop:seamonkey-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-0:1.0.3-0.el3.1.src", "3ES:seamonkey-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-0:1.0.3-0.el3.1.src", "3WS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0608" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-3812", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "200455" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to reference remote files and possibly load chrome: URLs by tricking the user into copying or dragging links.", "title": "Vulnerability description" }, { "category": "summary", "text": "vulnerabilities: CVE-2006-{3113,3677,3801-3812}", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:seamonkey-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-0:1.0.3-0.el3.1.src", "3AS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-0:1.0.3-0.el3.1.src", "3Desktop:seamonkey-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-0:1.0.3-0.el3.1.src", "3ES:seamonkey-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-0:1.0.3-0.el3.1.src", "3WS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3812" }, { "category": "external", "summary": "RHBZ#200455", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=200455" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3812", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3812" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3812", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3812" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-27T19:53:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "3AS:seamonkey-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-0:1.0.3-0.el3.1.src", "3AS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-0:1.0.3-0.el3.1.src", "3Desktop:seamonkey-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-0:1.0.3-0.el3.1.src", "3ES:seamonkey-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-0:1.0.3-0.el3.1.src", "3WS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0608" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "vulnerabilities: CVE-2006-{3113,3677,3801-3812}" } ] }
rhsa-2006:0610
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated firefox packages that fix several security bugs are now available\nfor Red Hat Enterprise Linux 4.\n\nThis update has been rated as having critical security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "Mozilla Firefox is an open source Web browser.\n\nThe Mozilla Foundation has discontinued support for the Mozilla Firefox\n1.0 branch. This update deprecates the Mozilla Firefox 1.0 branch in\nRed Hat Enterprise Linux 4 in favor of the supported Mozilla Firefox\n1.5 branch.\n\nThis update also resolves a number of outstanding Firefox security issues:\n\nSeveral flaws were found in the way Firefox processed certain javascript\nactions. A malicious web page could execute arbitrary javascript\ninstructions with the permissions of \"chrome\", allowing the page to steal\nsensitive information or install browser malware. (CVE-2006-2776,\nCVE-2006-2784, CVE-2006-2785, CVE-2006-2787, CVE-2006-3807, CVE-2006-3809,\nCVE-2006-3812)\n\nSeveral denial of service flaws were found in the way Firefox processed\ncertain web content. A malicious web page could crash the browser or\npossibly execute arbitrary code as the user running Firefox.\n(CVE-2006-2779, CVE-2006-2780, CVE-2006-3801, CVE-2006-3677, CVE-2006-3113,\nCVE-2006-3803, CVE-2006-3805, CVE-2006-3806, CVE-2006-3811)\n\nA cross-site scripting flaw was found in the way Firefox processed\nUnicode Byte-Order-Mark (BOM) markers in UTF-8 web pages. A malicious web\npage could execute a script within the browser that a web input sanitizer\ncould miss due to a malformed \"script\" tag. (CVE-2006-2783)\n\nSeveral flaws were found in the way Firefox processed certain javascript\nactions. A malicious web page could conduct a cross-site scripting attack\nor steal sensitive information (such as cookies owned by other domains).\n(CVE-2006-3802, CVE-2006-3810)\n\nA form file upload flaw was found in the way Firefox handled javascript\ninput object mutation. A malicious web page could upload an arbitrary local\nfile at form submission time without user interaction. (CVE-2006-2782)\n\nA denial of service flaw was found in the way Firefox called the\ncrypto.signText() javascript function. A malicious web page could crash the\nbrowser if the victim had a client certificate loaded. (CVE-2006-2778)\n\nTwo HTTP response smuggling flaws were found in the way Firefox processed\ncertain invalid HTTP response headers. A malicious web site could return\nspecially crafted HTTP response headers which may bypass HTTP proxy\nrestrictions. (CVE-2006-2786)\n\nA flaw was found in the way Firefox processed Proxy AutoConfig scripts. A\nmalicious Proxy AutoConfig server could execute arbitrary javascript\ninstructions with the permissions of \"chrome\", allowing the page to steal\nsensitive information or install browser malware. (CVE-2006-3808)\n\nA double free flaw was found in the way the nsIX509::getRawDER method was\ncalled. If a victim visited a carefully crafted web page, it was possible\nto execute arbitrary code as the user running Firefox. (CVE-2006-2788)\n\nUsers of Firefox are advised to upgrade to this update, which contains\nFirefox version 1.5.0.5 that corrects these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2006:0610", "url": "https://access.redhat.com/errata/RHSA-2006:0610" }, { "category": "external", "summary": "http://www.redhat.com/security/updates/classification/#critical", "url": "http://www.redhat.com/security/updates/classification/#critical" }, { "category": "external", "summary": "193895", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=193895" }, { "category": "external", "summary": "196973", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=196973" }, { "category": "external", "summary": "200168", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=200168" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2006/rhsa-2006_0610.json" } ], "title": "Red Hat Security Advisory: firefox security update", "tracking": { "current_release_date": "2025-09-10T13:38:42+00:00", "generator": { "date": "2025-09-10T13:38:42+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.7" } }, "id": "RHSA-2006:0610", "initial_release_date": "2006-07-28T23:22:00+00:00", "revision_history": [ { "date": "2006-07-28T23:22:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2006-07-28T00:00:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-09-10T13:38:42+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 4", "product": { "name": "Red Hat Enterprise Linux AS version 4", "product_id": "4AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::as" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop version 4", "product": { "name": "Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 4", "product": { "name": "Red Hat Enterprise Linux ES version 4", "product_id": "4ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 4", "product": { "name": "Red Hat Enterprise Linux WS version 4", "product_id": "4WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::ws" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "firefox-0:1.5.0.5-0.el4.1.ia64", "product": { "name": "firefox-0:1.5.0.5-0.el4.1.ia64", "product_id": "firefox-0:1.5.0.5-0.el4.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox@1.5.0.5-0.el4.1?arch=ia64" } } }, { "category": "product_version", "name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "product": { "name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "product_id": "firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox-debuginfo@1.5.0.5-0.el4.1?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "firefox-0:1.5.0.5-0.el4.1.src", "product": { "name": "firefox-0:1.5.0.5-0.el4.1.src", "product_id": "firefox-0:1.5.0.5-0.el4.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox@1.5.0.5-0.el4.1?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "firefox-0:1.5.0.5-0.el4.1.x86_64", "product": { "name": "firefox-0:1.5.0.5-0.el4.1.x86_64", "product_id": "firefox-0:1.5.0.5-0.el4.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox@1.5.0.5-0.el4.1?arch=x86_64" } } }, { "category": "product_version", "name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "product": { "name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "product_id": "firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox-debuginfo@1.5.0.5-0.el4.1?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "firefox-0:1.5.0.5-0.el4.1.i386", "product": { "name": "firefox-0:1.5.0.5-0.el4.1.i386", "product_id": "firefox-0:1.5.0.5-0.el4.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox@1.5.0.5-0.el4.1?arch=i386" } } }, { "category": "product_version", "name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "product": { "name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "product_id": "firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox-debuginfo@1.5.0.5-0.el4.1?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "firefox-0:1.5.0.5-0.el4.1.ppc", "product": { "name": "firefox-0:1.5.0.5-0.el4.1.ppc", "product_id": "firefox-0:1.5.0.5-0.el4.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox@1.5.0.5-0.el4.1?arch=ppc" } } }, { "category": "product_version", "name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "product": { "name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "product_id": "firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox-debuginfo@1.5.0.5-0.el4.1?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "firefox-0:1.5.0.5-0.el4.1.s390x", "product": { "name": "firefox-0:1.5.0.5-0.el4.1.s390x", "product_id": "firefox-0:1.5.0.5-0.el4.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox@1.5.0.5-0.el4.1?arch=s390x" } } }, { "category": "product_version", "name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "product": { "name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "product_id": "firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox-debuginfo@1.5.0.5-0.el4.1?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "firefox-0:1.5.0.5-0.el4.1.s390", "product": { "name": "firefox-0:1.5.0.5-0.el4.1.s390", "product_id": "firefox-0:1.5.0.5-0.el4.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox@1.5.0.5-0.el4.1?arch=s390" } } }, { "category": "product_version", "name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "product": { "name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "product_id": "firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox-debuginfo@1.5.0.5-0.el4.1?arch=s390" } } } ], "category": "architecture", "name": "s390" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.5-0.el4.1.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:firefox-0:1.5.0.5-0.el4.1.i386" }, "product_reference": "firefox-0:1.5.0.5-0.el4.1.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.5-0.el4.1.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:firefox-0:1.5.0.5-0.el4.1.ia64" }, "product_reference": "firefox-0:1.5.0.5-0.el4.1.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.5-0.el4.1.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:firefox-0:1.5.0.5-0.el4.1.ppc" }, "product_reference": "firefox-0:1.5.0.5-0.el4.1.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.5-0.el4.1.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:firefox-0:1.5.0.5-0.el4.1.s390" }, "product_reference": "firefox-0:1.5.0.5-0.el4.1.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.5-0.el4.1.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:firefox-0:1.5.0.5-0.el4.1.s390x" }, "product_reference": "firefox-0:1.5.0.5-0.el4.1.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.5-0.el4.1.src as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:firefox-0:1.5.0.5-0.el4.1.src" }, "product_reference": "firefox-0:1.5.0.5-0.el4.1.src", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.5-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:firefox-0:1.5.0.5-0.el4.1.x86_64" }, "product_reference": "firefox-0:1.5.0.5-0.el4.1.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386" }, "product_reference": "firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64" }, "product_reference": "firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc" }, "product_reference": "firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390" }, "product_reference": "firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x" }, "product_reference": "firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64" }, "product_reference": "firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.5-0.el4.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:firefox-0:1.5.0.5-0.el4.1.i386" }, "product_reference": "firefox-0:1.5.0.5-0.el4.1.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.5-0.el4.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64" }, "product_reference": "firefox-0:1.5.0.5-0.el4.1.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.5-0.el4.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc" }, "product_reference": "firefox-0:1.5.0.5-0.el4.1.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.5-0.el4.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390" }, "product_reference": "firefox-0:1.5.0.5-0.el4.1.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.5-0.el4.1.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x" }, "product_reference": "firefox-0:1.5.0.5-0.el4.1.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.5-0.el4.1.src as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:firefox-0:1.5.0.5-0.el4.1.src" }, "product_reference": "firefox-0:1.5.0.5-0.el4.1.src", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.5-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64" }, "product_reference": "firefox-0:1.5.0.5-0.el4.1.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386" }, "product_reference": "firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64" }, "product_reference": "firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc" }, "product_reference": "firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390" }, "product_reference": "firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x" }, "product_reference": "firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64" }, "product_reference": "firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.5-0.el4.1.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:firefox-0:1.5.0.5-0.el4.1.i386" }, "product_reference": "firefox-0:1.5.0.5-0.el4.1.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.5-0.el4.1.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:firefox-0:1.5.0.5-0.el4.1.ia64" }, "product_reference": "firefox-0:1.5.0.5-0.el4.1.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.5-0.el4.1.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:firefox-0:1.5.0.5-0.el4.1.ppc" }, "product_reference": "firefox-0:1.5.0.5-0.el4.1.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.5-0.el4.1.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:firefox-0:1.5.0.5-0.el4.1.s390" }, "product_reference": "firefox-0:1.5.0.5-0.el4.1.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.5-0.el4.1.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:firefox-0:1.5.0.5-0.el4.1.s390x" }, "product_reference": "firefox-0:1.5.0.5-0.el4.1.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.5-0.el4.1.src as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:firefox-0:1.5.0.5-0.el4.1.src" }, "product_reference": "firefox-0:1.5.0.5-0.el4.1.src", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.5-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:firefox-0:1.5.0.5-0.el4.1.x86_64" }, "product_reference": "firefox-0:1.5.0.5-0.el4.1.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386" }, "product_reference": "firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64" }, "product_reference": "firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc" }, "product_reference": "firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390" }, "product_reference": "firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x" }, "product_reference": "firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64" }, "product_reference": "firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.5-0.el4.1.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:firefox-0:1.5.0.5-0.el4.1.i386" }, "product_reference": "firefox-0:1.5.0.5-0.el4.1.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.5-0.el4.1.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:firefox-0:1.5.0.5-0.el4.1.ia64" }, "product_reference": "firefox-0:1.5.0.5-0.el4.1.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.5-0.el4.1.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:firefox-0:1.5.0.5-0.el4.1.ppc" }, "product_reference": "firefox-0:1.5.0.5-0.el4.1.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.5-0.el4.1.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:firefox-0:1.5.0.5-0.el4.1.s390" }, "product_reference": "firefox-0:1.5.0.5-0.el4.1.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.5-0.el4.1.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:firefox-0:1.5.0.5-0.el4.1.s390x" }, "product_reference": "firefox-0:1.5.0.5-0.el4.1.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.5-0.el4.1.src as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:firefox-0:1.5.0.5-0.el4.1.src" }, "product_reference": "firefox-0:1.5.0.5-0.el4.1.src", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.5-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:firefox-0:1.5.0.5-0.el4.1.x86_64" }, "product_reference": "firefox-0:1.5.0.5-0.el4.1.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386" }, "product_reference": "firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64" }, "product_reference": "firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc" }, "product_reference": "firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390" }, "product_reference": "firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x" }, "product_reference": "firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64" }, "product_reference": "firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "relates_to_product_reference": "4WS" } ] }, "vulnerabilities": [ { "cve": "CVE-2006-2776", "discovery_date": "2006-05-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618112" } ], "notes": [ { "category": "description", "text": "Certain privileged UI code in Mozilla Firefox and Thunderbird before 1.5.0.4 calls content-defined setters on an object prototype, which allows remote attackers to execute code at a higher privilege than intended.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:firefox-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-0:1.5.0.5-0.el4.1.src", "4AS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-0:1.5.0.5-0.el4.1.src", "4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-0:1.5.0.5-0.el4.1.src", "4ES:firefox-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-0:1.5.0.5-0.el4.1.src", "4WS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2776" }, { "category": "external", "summary": "RHBZ#1618112", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618112" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2776", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2776" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2776", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2776" } ], "release_date": "2006-06-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-28T23:22:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:firefox-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-0:1.5.0.5-0.el4.1.src", "4AS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-0:1.5.0.5-0.el4.1.src", "4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-0:1.5.0.5-0.el4.1.src", "4ES:firefox-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-0:1.5.0.5-0.el4.1.src", "4WS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0610" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2006-2778", "discovery_date": "2006-05-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618113" } ], "notes": [ { "category": "description", "text": "The crypto.signText function in Mozilla Firefox and Thunderbird before 1.5.0.4 allows remote attackers to execute arbitrary code via certain optional Certificate Authority name arguments, which causes an invalid array index and triggers a buffer overflow.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:firefox-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-0:1.5.0.5-0.el4.1.src", "4AS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-0:1.5.0.5-0.el4.1.src", "4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-0:1.5.0.5-0.el4.1.src", "4ES:firefox-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-0:1.5.0.5-0.el4.1.src", "4WS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2778" }, { "category": "external", "summary": "RHBZ#1618113", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618113" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2778", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2778" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2778", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2778" } ], "release_date": "2006-06-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-28T23:22:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:firefox-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-0:1.5.0.5-0.el4.1.src", "4AS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-0:1.5.0.5-0.el4.1.src", "4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-0:1.5.0.5-0.el4.1.src", "4ES:firefox-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-0:1.5.0.5-0.el4.1.src", "4WS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0610" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2006-2779", "discovery_date": "2006-06-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618114" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox and Thunderbird before 1.5.0.4 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via (1) nested \u003coption\u003e tags in a select tag, (2) a DOMNodeRemoved mutation event, (3) \"Content-implemented tree views,\" (4) BoxObjects, (5) the XBL implementation, (6) an iframe that attempts to remove itself, which leads to memory corruption.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:firefox-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-0:1.5.0.5-0.el4.1.src", "4AS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-0:1.5.0.5-0.el4.1.src", "4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-0:1.5.0.5-0.el4.1.src", "4ES:firefox-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-0:1.5.0.5-0.el4.1.src", "4WS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2779" }, { "category": "external", "summary": "RHBZ#1618114", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618114" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2779", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2779" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2779", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2779" } ], "release_date": "2006-06-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-28T23:22:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:firefox-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-0:1.5.0.5-0.el4.1.src", "4AS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-0:1.5.0.5-0.el4.1.src", "4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-0:1.5.0.5-0.el4.1.src", "4ES:firefox-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-0:1.5.0.5-0.el4.1.src", "4WS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0610" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-2780", "discovery_date": "2006-06-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618115" } ], "notes": [ { "category": "description", "text": "Integer overflow in Mozilla Firefox and Thunderbird before 1.5.0.4 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via \"jsstr tagify,\" which leads to memory corruption.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:firefox-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-0:1.5.0.5-0.el4.1.src", "4AS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-0:1.5.0.5-0.el4.1.src", "4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-0:1.5.0.5-0.el4.1.src", "4ES:firefox-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-0:1.5.0.5-0.el4.1.src", "4WS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2780" }, { "category": "external", "summary": "RHBZ#1618115", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618115" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2780", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2780" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2780", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2780" } ], "release_date": "2006-06-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-28T23:22:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:firefox-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-0:1.5.0.5-0.el4.1.src", "4AS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-0:1.5.0.5-0.el4.1.src", "4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-0:1.5.0.5-0.el4.1.src", "4ES:firefox-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-0:1.5.0.5-0.el4.1.src", "4WS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0610" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-2782", "discovery_date": "2006-05-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618116" } ], "notes": [ { "category": "description", "text": "Firefox 1.5.0.2 does not fix all test cases associated with CVE-2006-1729, which allows remote attackers to read arbitrary files by inserting the target filename into a text box, then turning that box into a file upload control.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:firefox-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-0:1.5.0.5-0.el4.1.src", "4AS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-0:1.5.0.5-0.el4.1.src", "4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-0:1.5.0.5-0.el4.1.src", "4ES:firefox-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-0:1.5.0.5-0.el4.1.src", "4WS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2782" }, { "category": "external", "summary": "RHBZ#1618116", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618116" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2782", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2782" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2782", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2782" } ], "release_date": "2006-06-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-28T23:22:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:firefox-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-0:1.5.0.5-0.el4.1.src", "4AS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-0:1.5.0.5-0.el4.1.src", "4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-0:1.5.0.5-0.el4.1.src", "4ES:firefox-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-0:1.5.0.5-0.el4.1.src", "4WS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0610" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2006-2783", "discovery_date": "2006-05-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618117" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox and Thunderbird before 1.5.0.4 strip the Unicode Byte-order-Mark (BOM) from a UTF-8 page before the page is passed to the parser, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a BOM sequence in the middle of a dangerous tag such as SCRIPT.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:firefox-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-0:1.5.0.5-0.el4.1.src", "4AS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-0:1.5.0.5-0.el4.1.src", "4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-0:1.5.0.5-0.el4.1.src", "4ES:firefox-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-0:1.5.0.5-0.el4.1.src", "4WS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2783" }, { "category": "external", "summary": "RHBZ#1618117", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618117" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2783", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2783" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2783", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2783" } ], "release_date": "2006-06-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-28T23:22:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:firefox-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-0:1.5.0.5-0.el4.1.src", "4AS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-0:1.5.0.5-0.el4.1.src", "4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-0:1.5.0.5-0.el4.1.src", "4ES:firefox-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-0:1.5.0.5-0.el4.1.src", "4WS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0610" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2006-2784", "discovery_date": "2006-05-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618118" } ], "notes": [ { "category": "description", "text": "The PLUGINSPAGE functionality in Mozilla Firefox before 1.5.0.4 allows remote user-assisted attackers to execute privileged code by tricking a user into installing missing plugins and selecting the \"Manual Install\" button, then using nested javascript: URLs. NOTE: the manual install button is used for downloading software from a remote web site, so this issue would not cross privilege boundaries if the user progresses to the point of installing malicious software from the attacker-controlled site.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:firefox-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-0:1.5.0.5-0.el4.1.src", "4AS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-0:1.5.0.5-0.el4.1.src", "4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-0:1.5.0.5-0.el4.1.src", "4ES:firefox-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-0:1.5.0.5-0.el4.1.src", "4WS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2784" }, { "category": "external", "summary": "RHBZ#1618118", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618118" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2784", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2784" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2784", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2784" } ], "release_date": "2006-06-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-28T23:22:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:firefox-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-0:1.5.0.5-0.el4.1.src", "4AS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-0:1.5.0.5-0.el4.1.src", "4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-0:1.5.0.5-0.el4.1.src", "4ES:firefox-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-0:1.5.0.5-0.el4.1.src", "4WS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0610" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2006-2785", "discovery_date": "2006-05-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618119" } ], "notes": [ { "category": "description", "text": "Cross-site scripting (XSS) vulnerability in Mozilla Firefox before 1.5.0.4 allows user-assisted remote attackers to inject arbitrary web script or HTML by tricking a user into (1) performing a \"View Image\" on a broken image in which the SRC attribute contains a Javascript URL, or (2) selecting \"Show only this frame\" on a frame whose SRC attribute contains a Javascript URL.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:firefox-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-0:1.5.0.5-0.el4.1.src", "4AS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-0:1.5.0.5-0.el4.1.src", "4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-0:1.5.0.5-0.el4.1.src", "4ES:firefox-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-0:1.5.0.5-0.el4.1.src", "4WS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2785" }, { "category": "external", "summary": "RHBZ#1618119", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618119" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2785", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2785" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2785", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2785" } ], "release_date": "2006-06-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-28T23:22:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:firefox-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-0:1.5.0.5-0.el4.1.src", "4AS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-0:1.5.0.5-0.el4.1.src", "4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-0:1.5.0.5-0.el4.1.src", "4ES:firefox-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-0:1.5.0.5-0.el4.1.src", "4WS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0610" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2006-2786", "discovery_date": "2006-05-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618120" } ], "notes": [ { "category": "description", "text": "HTTP response smuggling vulnerability in Mozilla Firefox and Thunderbird before 1.5.0.4, when used with certain proxy servers, allows remote attackers to cause Firefox to interpret certain responses as if they were responses from two different sites via (1) invalid HTTP response headers with spaces between the header name and the colon, which might not be ignored in some cases, or (2) HTTP 1.1 headers through an HTTP 1.0 proxy, which are ignored by the proxy but processed by the client.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:firefox-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-0:1.5.0.5-0.el4.1.src", "4AS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-0:1.5.0.5-0.el4.1.src", "4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-0:1.5.0.5-0.el4.1.src", "4ES:firefox-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-0:1.5.0.5-0.el4.1.src", "4WS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2786" }, { "category": "external", "summary": "RHBZ#1618120", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618120" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2786", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2786" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2786", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2786" } ], "release_date": "2006-06-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-28T23:22:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:firefox-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-0:1.5.0.5-0.el4.1.src", "4AS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-0:1.5.0.5-0.el4.1.src", "4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-0:1.5.0.5-0.el4.1.src", "4ES:firefox-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-0:1.5.0.5-0.el4.1.src", "4WS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0610" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2006-2787", "discovery_date": "2006-05-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618121" } ], "notes": [ { "category": "description", "text": "EvalInSandbox in Mozilla Firefox and Thunderbird before 1.5.0.4 allows remote attackers to gain privileges via javascript that calls the valueOf method on objects that were created outside of the sandbox.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:firefox-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-0:1.5.0.5-0.el4.1.src", "4AS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-0:1.5.0.5-0.el4.1.src", "4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-0:1.5.0.5-0.el4.1.src", "4ES:firefox-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-0:1.5.0.5-0.el4.1.src", "4WS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2787" }, { "category": "external", "summary": "RHBZ#1618121", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618121" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2787", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2787" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2787", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2787" } ], "release_date": "2006-06-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-28T23:22:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:firefox-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-0:1.5.0.5-0.el4.1.src", "4AS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-0:1.5.0.5-0.el4.1.src", "4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-0:1.5.0.5-0.el4.1.src", "4ES:firefox-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-0:1.5.0.5-0.el4.1.src", "4WS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0610" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2006-2788", "discovery_date": "2006-05-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618122" } ], "notes": [ { "category": "description", "text": "Double free vulnerability in the getRawDER function for nsIX509Cert in Firefox allows remote attackers to cause a denial of service (hang) and possibly execute arbitrary code via certain Javascript code.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:firefox-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-0:1.5.0.5-0.el4.1.src", "4AS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-0:1.5.0.5-0.el4.1.src", "4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-0:1.5.0.5-0.el4.1.src", "4ES:firefox-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-0:1.5.0.5-0.el4.1.src", "4WS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2788" }, { "category": "external", "summary": "RHBZ#1618122", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618122" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2788", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2788" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2788", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2788" } ], "release_date": "2006-06-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-28T23:22:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:firefox-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-0:1.5.0.5-0.el4.1.src", "4AS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-0:1.5.0.5-0.el4.1.src", "4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-0:1.5.0.5-0.el4.1.src", "4ES:firefox-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-0:1.5.0.5-0.el4.1.src", "4WS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0610" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2006-3113", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618135" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox 1.5 before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via simultaneous XPCOM events, which causes a timer object to be deleted in a way that triggers memory corruption.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:firefox-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-0:1.5.0.5-0.el4.1.src", "4AS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-0:1.5.0.5-0.el4.1.src", "4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-0:1.5.0.5-0.el4.1.src", "4ES:firefox-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-0:1.5.0.5-0.el4.1.src", "4WS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3113" }, { "category": "external", "summary": "RHBZ#1618135", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618135" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3113", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3113" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3113", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3113" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-28T23:22:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:firefox-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-0:1.5.0.5-0.el4.1.src", "4AS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-0:1.5.0.5-0.el4.1.src", "4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-0:1.5.0.5-0.el4.1.src", "4ES:firefox-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-0:1.5.0.5-0.el4.1.src", "4WS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0610" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-3677", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618153" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox 1.5 before 1.5.0.5 and SeaMonkey before 1.0.3 allows remote attackers to execute arbitrary code by changing certain properties of the window navigator object (window.navigator) that are accessed when Java starts up, which causes a crash that leads to code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:firefox-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-0:1.5.0.5-0.el4.1.src", "4AS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-0:1.5.0.5-0.el4.1.src", "4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-0:1.5.0.5-0.el4.1.src", "4ES:firefox-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-0:1.5.0.5-0.el4.1.src", "4WS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3677" }, { "category": "external", "summary": "RHBZ#1618153", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618153" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3677", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3677" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3677", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3677" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-28T23:22:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:firefox-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-0:1.5.0.5-0.el4.1.src", "4AS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-0:1.5.0.5-0.el4.1.src", "4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-0:1.5.0.5-0.el4.1.src", "4ES:firefox-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-0:1.5.0.5-0.el4.1.src", "4WS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0610" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-3801", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618161" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox 1.5 before 1.5.0.5 and SeaMonkey before 1.0.3 does not properly clear a JavaScript reference to a frame or window, which leaves a pointer to a deleted object that allows remote attackers to execute arbitrary native code.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:firefox-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-0:1.5.0.5-0.el4.1.src", "4AS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-0:1.5.0.5-0.el4.1.src", "4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-0:1.5.0.5-0.el4.1.src", "4ES:firefox-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-0:1.5.0.5-0.el4.1.src", "4WS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3801" }, { "category": "external", "summary": "RHBZ#1618161", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618161" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3801", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3801" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3801", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3801" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-28T23:22:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:firefox-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-0:1.5.0.5-0.el4.1.src", "4AS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-0:1.5.0.5-0.el4.1.src", "4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-0:1.5.0.5-0.el4.1.src", "4ES:firefox-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-0:1.5.0.5-0.el4.1.src", "4WS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0610" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-3802", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618162" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to hijack native DOM methods from objects in another domain and conduct cross-site scripting (XSS) attacks using DOM methods of the top-level object.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:firefox-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-0:1.5.0.5-0.el4.1.src", "4AS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-0:1.5.0.5-0.el4.1.src", "4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-0:1.5.0.5-0.el4.1.src", "4ES:firefox-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-0:1.5.0.5-0.el4.1.src", "4WS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3802" }, { "category": "external", "summary": "RHBZ#1618162", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618162" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3802", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3802" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3802", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3802" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-28T23:22:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:firefox-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-0:1.5.0.5-0.el4.1.src", "4AS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-0:1.5.0.5-0.el4.1.src", "4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-0:1.5.0.5-0.el4.1.src", "4ES:firefox-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-0:1.5.0.5-0.el4.1.src", "4WS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0610" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2006-3803", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618163" } ], "notes": [ { "category": "description", "text": "Race condition in the JavaScript garbage collection in Mozilla Firefox 1.5 before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 might allow remote attackers to execute arbitrary code by causing the garbage collector to delete a temporary variable while it is still being used during the creation of a new Function object.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:firefox-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-0:1.5.0.5-0.el4.1.src", "4AS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-0:1.5.0.5-0.el4.1.src", "4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-0:1.5.0.5-0.el4.1.src", "4ES:firefox-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-0:1.5.0.5-0.el4.1.src", "4WS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3803" }, { "category": "external", "summary": "RHBZ#1618163", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618163" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3803", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3803" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3803", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3803" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-28T23:22:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:firefox-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-0:1.5.0.5-0.el4.1.src", "4AS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-0:1.5.0.5-0.el4.1.src", "4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-0:1.5.0.5-0.el4.1.src", "4ES:firefox-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-0:1.5.0.5-0.el4.1.src", "4WS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0610" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-3805", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618165" } ], "notes": [ { "category": "description", "text": "The Javascript engine in Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 might allow remote attackers to execute arbitrary code via vectors involving garbage collection that causes deletion of a temporary object that is still being used.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:firefox-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-0:1.5.0.5-0.el4.1.src", "4AS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-0:1.5.0.5-0.el4.1.src", "4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-0:1.5.0.5-0.el4.1.src", "4ES:firefox-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-0:1.5.0.5-0.el4.1.src", "4WS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3805" }, { "category": "external", "summary": "RHBZ#1618165", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618165" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3805", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3805" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3805", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3805" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-28T23:22:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:firefox-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-0:1.5.0.5-0.el4.1.src", "4AS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-0:1.5.0.5-0.el4.1.src", "4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-0:1.5.0.5-0.el4.1.src", "4ES:firefox-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-0:1.5.0.5-0.el4.1.src", "4WS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0610" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-3806", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618166" } ], "notes": [ { "category": "description", "text": "Multiple integer overflows in the Javascript engine in Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 might allow remote attackers to execute arbitrary code via vectors involving (1) long strings in the toSource method of the Object, Array, and String objects; and (2) unspecified \"string function arguments.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:firefox-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-0:1.5.0.5-0.el4.1.src", "4AS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-0:1.5.0.5-0.el4.1.src", "4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-0:1.5.0.5-0.el4.1.src", "4ES:firefox-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-0:1.5.0.5-0.el4.1.src", "4WS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3806" }, { "category": "external", "summary": "RHBZ#1618166", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618166" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3806", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3806" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3806", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3806" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-28T23:22:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:firefox-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-0:1.5.0.5-0.el4.1.src", "4AS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-0:1.5.0.5-0.el4.1.src", "4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-0:1.5.0.5-0.el4.1.src", "4ES:firefox-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-0:1.5.0.5-0.el4.1.src", "4WS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0610" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-3807", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618167" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to execute arbitrary code via script that changes the standard Object() constructor to return a reference to a privileged object and calling \"named JavaScript functions\" that use the constructor.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:firefox-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-0:1.5.0.5-0.el4.1.src", "4AS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-0:1.5.0.5-0.el4.1.src", "4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-0:1.5.0.5-0.el4.1.src", "4ES:firefox-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-0:1.5.0.5-0.el4.1.src", "4WS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3807" }, { "category": "external", "summary": "RHBZ#1618167", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618167" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3807", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3807" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3807", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3807" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-28T23:22:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:firefox-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-0:1.5.0.5-0.el4.1.src", "4AS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-0:1.5.0.5-0.el4.1.src", "4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-0:1.5.0.5-0.el4.1.src", "4ES:firefox-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-0:1.5.0.5-0.el4.1.src", "4WS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0610" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-3808", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618168" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox before 1.5.0.5 and SeaMonkey before 1.0.3 allows remote Proxy AutoConfig (PAC) servers to execute code with elevated privileges via a PAC script that sets the FindProxyForURL function to an eval method on a privileged object.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:firefox-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-0:1.5.0.5-0.el4.1.src", "4AS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-0:1.5.0.5-0.el4.1.src", "4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-0:1.5.0.5-0.el4.1.src", "4ES:firefox-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-0:1.5.0.5-0.el4.1.src", "4WS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3808" }, { "category": "external", "summary": "RHBZ#1618168", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618168" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3808", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3808" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3808", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3808" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-28T23:22:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:firefox-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-0:1.5.0.5-0.el4.1.src", "4AS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-0:1.5.0.5-0.el4.1.src", "4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-0:1.5.0.5-0.el4.1.src", "4ES:firefox-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-0:1.5.0.5-0.el4.1.src", "4WS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0610" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2006-3809", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618169" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows scripts with the UniversalBrowserRead privilege to gain UniversalXPConnect privileges and possibly execute code or obtain sensitive data by reading into a privileged context.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:firefox-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-0:1.5.0.5-0.el4.1.src", "4AS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-0:1.5.0.5-0.el4.1.src", "4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-0:1.5.0.5-0.el4.1.src", "4ES:firefox-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-0:1.5.0.5-0.el4.1.src", "4WS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3809" }, { "category": "external", "summary": "RHBZ#1618169", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618169" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3809", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3809" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3809", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3809" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-28T23:22:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:firefox-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-0:1.5.0.5-0.el4.1.src", "4AS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-0:1.5.0.5-0.el4.1.src", "4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-0:1.5.0.5-0.el4.1.src", "4ES:firefox-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-0:1.5.0.5-0.el4.1.src", "4WS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0610" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-3810", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618170" } ], "notes": [ { "category": "description", "text": "Cross-site scripting (XSS) vulnerability in Mozilla Firefox 1.5 before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to inject arbitrary web script or HTML via the XPCNativeWrapper(window).Function construct.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:firefox-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-0:1.5.0.5-0.el4.1.src", "4AS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-0:1.5.0.5-0.el4.1.src", "4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-0:1.5.0.5-0.el4.1.src", "4ES:firefox-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-0:1.5.0.5-0.el4.1.src", "4WS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3810" }, { "category": "external", "summary": "RHBZ#1618170", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618170" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3810", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3810" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3810", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3810" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-28T23:22:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:firefox-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-0:1.5.0.5-0.el4.1.src", "4AS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-0:1.5.0.5-0.el4.1.src", "4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-0:1.5.0.5-0.el4.1.src", "4ES:firefox-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-0:1.5.0.5-0.el4.1.src", "4WS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0610" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2006-3811", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618171" } ], "notes": [ { "category": "description", "text": "Multiple vulnerabilities in Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via Javascript that leads to memory corruption, including (1) nsListControlFrame::FireMenuItemActiveEvent, (2) buffer overflows in the string class in out-of-memory conditions, (3) table row and column groups, (4) \"anonymous box selectors outside of UA stylesheets,\" (5) stale references to \"removed nodes,\" and (6) running the crypto.generateCRMFRequest callback on deleted context.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:firefox-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-0:1.5.0.5-0.el4.1.src", "4AS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-0:1.5.0.5-0.el4.1.src", "4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-0:1.5.0.5-0.el4.1.src", "4ES:firefox-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-0:1.5.0.5-0.el4.1.src", "4WS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3811" }, { "category": "external", "summary": "RHBZ#1618171", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618171" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3811", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3811" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3811", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3811" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-28T23:22:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:firefox-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-0:1.5.0.5-0.el4.1.src", "4AS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-0:1.5.0.5-0.el4.1.src", "4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-0:1.5.0.5-0.el4.1.src", "4ES:firefox-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-0:1.5.0.5-0.el4.1.src", "4WS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0610" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-3812", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "200455" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to reference remote files and possibly load chrome: URLs by tricking the user into copying or dragging links.", "title": "Vulnerability description" }, { "category": "summary", "text": "vulnerabilities: CVE-2006-{3113,3677,3801-3812}", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:firefox-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-0:1.5.0.5-0.el4.1.src", "4AS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-0:1.5.0.5-0.el4.1.src", "4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-0:1.5.0.5-0.el4.1.src", "4ES:firefox-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-0:1.5.0.5-0.el4.1.src", "4WS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3812" }, { "category": "external", "summary": "RHBZ#200455", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=200455" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3812", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3812" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3812", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3812" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-28T23:22:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:firefox-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-0:1.5.0.5-0.el4.1.src", "4AS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-0:1.5.0.5-0.el4.1.src", "4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-0:1.5.0.5-0.el4.1.src", "4ES:firefox-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-0:1.5.0.5-0.el4.1.src", "4WS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0610" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "vulnerabilities: CVE-2006-{3113,3677,3801-3812}" } ] }
rhsa-2006:0594
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated seamonkey packages that fix several security bugs in the mozilla\npackages are now available for Red Hat Enterprise Linux 2.1.\n\nThis update has been rated as having critical security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "SeaMonkey is an open source Web browser, advanced email and newsgroup\nclient, IRC chat client, and HTML editor.\n\nThe Mozilla Foundation has discontinued support for the Mozilla Suite. This\nupdate deprecates the Mozilla Suite in Red Hat Enterprise Linux 2.1 in\nfavor of the supported SeaMonkey Suite.\n\nThis update also resolves a number of outstanding Mozilla security issues:\n\nSeveral flaws were found in the way SeaMonkey processed certain javascript\nactions. A malicious web page could execute arbitrary javascript\ninstructions with the permissions of \"chrome\", allowing the page to steal\nsensitive information or install browser malware. (CVE-2006-2776,\nCVE-2006-2784, CVE-2006-2785, CVE-2006-2787, CVE-2006-3807, CVE-2006-3809,\nCVE-2006-3812)\n\nSeveral denial of service flaws were found in the way SeaMonkey processed\ncertain web content. A malicious web page could crash the browser or\npossibly execute arbitrary code as the user running SeaMonkey.\n(CVE-2006-2779, CVE-2006-2780, CVE-2006-3801, CVE-2006-3677, CVE-2006-3113,\nCVE-2006-3803, CVE-2006-3805, CVE-2006-3806, CVE-2006-3811)\n\nTwo flaws were found in the way SeaMonkey Messenger displayed malformed\ninline vcard attachments. If a victim viewed an email message containing\na carefully crafted vcard it was possible to execute arbitrary code as the\nuser running SeaMonkey Messenger. (CVE-2006-2781, CVE-2006-3804)\n\nA cross-site scripting flaw was found in the way SeaMonkey processed\nUnicode Byte-Order-Mark (BOM) markers in UTF-8 web pages. A malicious web\npage could execute a script within the browser that a web input sanitizer\ncould miss due to a malformed \"script\" tag. (CVE-2006-2783)\n\nSeveral flaws were found in the way SeaMonkey processed certain javascript\nactions. A malicious web page could conduct a cross-site scripting attack\nor steal sensitive information (such as cookies owned by other domains).\n(CVE-2006-3802, CVE-2006-3810)\n\nA form file upload flaw was found in the way SeaMonkey handled javascript\ninput object mutation. A malicious web page could upload an arbitrary local\nfile at form submission time without user interaction. (CVE-2006-2782)\n\nA denial of service flaw was found in the way SeaMonkey called the\ncrypto.signText() javascript function. A malicious web page could crash the\nbrowser if the victim had a client certificate loaded. (CVE-2006-2778)\n\nTwo HTTP response smuggling flaws were found in the way SeaMonkey processed\ncertain invalid HTTP response headers. A malicious web site could return\nspecially crafted HTTP response headers which may bypass HTTP proxy\nrestrictions. (CVE-2006-2786)\n\nA flaw was found in the way SeaMonkey processed Proxy AutoConfig scripts. A\nmalicious Proxy AutoConfig server could execute arbitrary javascript\ninstructions with the permissions of \"chrome\", allowing the page to steal\nsensitive information or install browser malware. (CVE-2006-3808)\n\nA double free flaw was found in the way the nsIX509::getRawDER method was\ncalled. If a victim visited a carefully crafted web page it was possible to\nexecute arbitrary code as the user running SeaMonkey. (CVE-2006-2788)\n\nUsers of Mozilla are advised to upgrade to this update, which contains\nSeaMonkey version 1.0.3 that corrects these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2006:0594", "url": "https://access.redhat.com/errata/RHSA-2006:0594" }, { "category": "external", "summary": "http://www.redhat.com/security/updates/classification/#critical", "url": "http://www.redhat.com/security/updates/classification/#critical" }, { "category": "external", "summary": "198686", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=198686" }, { "category": "external", "summary": "198687", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=198687" }, { "category": "external", "summary": "200167", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=200167" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2006/rhsa-2006_0594.json" } ], "title": "Red Hat Security Advisory: seamonkey security update (was mozilla)", "tracking": { "current_release_date": "2025-09-10T13:38:38+00:00", "generator": { "date": "2025-09-10T13:38:38+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.7" } }, "id": "RHSA-2006:0594", "initial_release_date": "2006-08-28T11:30:00+00:00", "revision_history": [ { "date": "2006-08-28T11:30:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2006-09-15T09:27:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-09-10T13:38:38+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product": { "name": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::as" } } }, { "category": "product_name", "name": "Red Hat Linux Advanced Workstation 2.1", "product": { "name": "Red Hat Linux Advanced Workstation 2.1", "product_id": "Red Hat Linux Advanced Workstation 2.1", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::aw" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 2.1", "product": { "name": "Red Hat Enterprise Linux ES version 2.1", "product_id": "Red Hat Enterprise Linux ES version 2.1", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 2.1", "product": { "name": "Red Hat Enterprise Linux WS version 2.1", "product_id": "Red Hat Enterprise Linux WS version 2.1", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::ws" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2006-2776", "discovery_date": "2006-05-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618112" } ], "notes": [ { "category": "description", "text": "Certain privileged UI code in Mozilla Firefox and Thunderbird before 1.5.0.4 calls content-defined setters on an object prototype, which allows remote attackers to execute code at a higher privilege than intended.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2776" }, { "category": "external", "summary": "RHBZ#1618112", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618112" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2776", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2776" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2776", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2776" } ], "release_date": "2006-06-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-08-28T11:30:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0594" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2006-2778", "discovery_date": "2006-05-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618113" } ], "notes": [ { "category": "description", "text": "The crypto.signText function in Mozilla Firefox and Thunderbird before 1.5.0.4 allows remote attackers to execute arbitrary code via certain optional Certificate Authority name arguments, which causes an invalid array index and triggers a buffer overflow.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2778" }, { "category": "external", "summary": "RHBZ#1618113", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618113" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2778", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2778" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2778", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2778" } ], "release_date": "2006-06-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-08-28T11:30:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0594" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2006-2779", "discovery_date": "2006-06-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618114" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox and Thunderbird before 1.5.0.4 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via (1) nested \u003coption\u003e tags in a select tag, (2) a DOMNodeRemoved mutation event, (3) \"Content-implemented tree views,\" (4) BoxObjects, (5) the XBL implementation, (6) an iframe that attempts to remove itself, which leads to memory corruption.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2779" }, { "category": "external", "summary": "RHBZ#1618114", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618114" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2779", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2779" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2779", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2779" } ], "release_date": "2006-06-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-08-28T11:30:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0594" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-2780", "discovery_date": "2006-06-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618115" } ], "notes": [ { "category": "description", "text": "Integer overflow in Mozilla Firefox and Thunderbird before 1.5.0.4 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via \"jsstr tagify,\" which leads to memory corruption.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2780" }, { "category": "external", "summary": "RHBZ#1618115", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618115" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2780", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2780" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2780", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2780" } ], "release_date": "2006-06-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-08-28T11:30:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0594" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-2781", "discovery_date": "2006-06-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "193963" } ], "notes": [ { "category": "description", "text": "Double free vulnerability in nsVCard.cpp in Mozilla Thunderbird before 1.5.0.4 and SeaMonkey before 1.0.2 allows remote attackers to cause a denial of service (hang) and possibly execute arbitrary code via a VCard that contains invalid base64 characters.", "title": "Vulnerability description" }, { "category": "summary", "text": "(seamonkey): DOS/arbitrary code execution vuln with vcards", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2781" }, { "category": "external", "summary": "RHBZ#193963", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=193963" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2781", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2781" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2781", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2781" } ], "release_date": "2006-06-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-08-28T11:30:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0594" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "(seamonkey): DOS/arbitrary code execution vuln with vcards" }, { "cve": "CVE-2006-2782", "discovery_date": "2006-05-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618116" } ], "notes": [ { "category": "description", "text": "Firefox 1.5.0.2 does not fix all test cases associated with CVE-2006-1729, which allows remote attackers to read arbitrary files by inserting the target filename into a text box, then turning that box into a file upload control.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2782" }, { "category": "external", "summary": "RHBZ#1618116", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618116" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2782", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2782" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2782", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2782" } ], "release_date": "2006-06-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-08-28T11:30:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0594" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2006-2783", "discovery_date": "2006-05-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618117" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox and Thunderbird before 1.5.0.4 strip the Unicode Byte-order-Mark (BOM) from a UTF-8 page before the page is passed to the parser, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a BOM sequence in the middle of a dangerous tag such as SCRIPT.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2783" }, { "category": "external", "summary": "RHBZ#1618117", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618117" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2783", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2783" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2783", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2783" } ], "release_date": "2006-06-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-08-28T11:30:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0594" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2006-2784", "discovery_date": "2006-05-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618118" } ], "notes": [ { "category": "description", "text": "The PLUGINSPAGE functionality in Mozilla Firefox before 1.5.0.4 allows remote user-assisted attackers to execute privileged code by tricking a user into installing missing plugins and selecting the \"Manual Install\" button, then using nested javascript: URLs. NOTE: the manual install button is used for downloading software from a remote web site, so this issue would not cross privilege boundaries if the user progresses to the point of installing malicious software from the attacker-controlled site.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2784" }, { "category": "external", "summary": "RHBZ#1618118", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618118" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2784", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2784" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2784", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2784" } ], "release_date": "2006-06-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-08-28T11:30:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0594" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2006-2785", "discovery_date": "2006-05-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618119" } ], "notes": [ { "category": "description", "text": "Cross-site scripting (XSS) vulnerability in Mozilla Firefox before 1.5.0.4 allows user-assisted remote attackers to inject arbitrary web script or HTML by tricking a user into (1) performing a \"View Image\" on a broken image in which the SRC attribute contains a Javascript URL, or (2) selecting \"Show only this frame\" on a frame whose SRC attribute contains a Javascript URL.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2785" }, { "category": "external", "summary": "RHBZ#1618119", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618119" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2785", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2785" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2785", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2785" } ], "release_date": "2006-06-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-08-28T11:30:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0594" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2006-2786", "discovery_date": "2006-05-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618120" } ], "notes": [ { "category": "description", "text": "HTTP response smuggling vulnerability in Mozilla Firefox and Thunderbird before 1.5.0.4, when used with certain proxy servers, allows remote attackers to cause Firefox to interpret certain responses as if they were responses from two different sites via (1) invalid HTTP response headers with spaces between the header name and the colon, which might not be ignored in some cases, or (2) HTTP 1.1 headers through an HTTP 1.0 proxy, which are ignored by the proxy but processed by the client.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2786" }, { "category": "external", "summary": "RHBZ#1618120", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618120" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2786", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2786" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2786", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2786" } ], "release_date": "2006-06-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-08-28T11:30:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0594" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2006-2787", "discovery_date": "2006-05-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618121" } ], "notes": [ { "category": "description", "text": "EvalInSandbox in Mozilla Firefox and Thunderbird before 1.5.0.4 allows remote attackers to gain privileges via javascript that calls the valueOf method on objects that were created outside of the sandbox.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2787" }, { "category": "external", "summary": "RHBZ#1618121", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618121" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2787", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2787" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2787", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2787" } ], "release_date": "2006-06-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-08-28T11:30:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0594" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2006-2788", "discovery_date": "2006-05-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618122" } ], "notes": [ { "category": "description", "text": "Double free vulnerability in the getRawDER function for nsIX509Cert in Firefox allows remote attackers to cause a denial of service (hang) and possibly execute arbitrary code via certain Javascript code.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2788" }, { "category": "external", "summary": "RHBZ#1618122", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618122" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2788", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2788" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2788", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2788" } ], "release_date": "2006-06-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-08-28T11:30:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0594" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2006-3113", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618135" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox 1.5 before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via simultaneous XPCOM events, which causes a timer object to be deleted in a way that triggers memory corruption.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3113" }, { "category": "external", "summary": "RHBZ#1618135", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618135" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3113", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3113" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3113", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3113" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-08-28T11:30:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0594" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-3677", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618153" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox 1.5 before 1.5.0.5 and SeaMonkey before 1.0.3 allows remote attackers to execute arbitrary code by changing certain properties of the window navigator object (window.navigator) that are accessed when Java starts up, which causes a crash that leads to code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3677" }, { "category": "external", "summary": "RHBZ#1618153", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618153" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3677", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3677" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3677", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3677" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-08-28T11:30:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0594" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-3801", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618161" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox 1.5 before 1.5.0.5 and SeaMonkey before 1.0.3 does not properly clear a JavaScript reference to a frame or window, which leaves a pointer to a deleted object that allows remote attackers to execute arbitrary native code.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3801" }, { "category": "external", "summary": "RHBZ#1618161", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618161" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3801", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3801" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3801", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3801" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-08-28T11:30:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0594" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-3802", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618162" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to hijack native DOM methods from objects in another domain and conduct cross-site scripting (XSS) attacks using DOM methods of the top-level object.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3802" }, { "category": "external", "summary": "RHBZ#1618162", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618162" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3802", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3802" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3802", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3802" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-08-28T11:30:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0594" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2006-3803", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618163" } ], "notes": [ { "category": "description", "text": "Race condition in the JavaScript garbage collection in Mozilla Firefox 1.5 before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 might allow remote attackers to execute arbitrary code by causing the garbage collector to delete a temporary variable while it is still being used during the creation of a new Function object.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3803" }, { "category": "external", "summary": "RHBZ#1618163", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618163" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3803", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3803" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3803", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3803" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-08-28T11:30:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0594" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-3804", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618164" } ], "notes": [ { "category": "description", "text": "Heap-based buffer overflow in Mozilla Thunderbird before 1.5.0.5 and SeaMonkey before 1.0.3 allows remote attackers to cause a denial of service (crash) via a VCard attachment with a malformed base64 field, which copies more data than expected due to an integer underflow.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3804" }, { "category": "external", "summary": "RHBZ#1618164", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618164" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3804", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3804" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3804", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3804" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-08-28T11:30:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0594" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-3805", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618165" } ], "notes": [ { "category": "description", "text": "The Javascript engine in Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 might allow remote attackers to execute arbitrary code via vectors involving garbage collection that causes deletion of a temporary object that is still being used.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3805" }, { "category": "external", "summary": "RHBZ#1618165", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618165" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3805", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3805" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3805", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3805" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-08-28T11:30:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0594" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-3806", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618166" } ], "notes": [ { "category": "description", "text": "Multiple integer overflows in the Javascript engine in Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 might allow remote attackers to execute arbitrary code via vectors involving (1) long strings in the toSource method of the Object, Array, and String objects; and (2) unspecified \"string function arguments.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3806" }, { "category": "external", "summary": "RHBZ#1618166", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618166" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3806", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3806" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3806", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3806" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-08-28T11:30:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0594" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-3807", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618167" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to execute arbitrary code via script that changes the standard Object() constructor to return a reference to a privileged object and calling \"named JavaScript functions\" that use the constructor.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3807" }, { "category": "external", "summary": "RHBZ#1618167", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618167" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3807", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3807" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3807", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3807" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-08-28T11:30:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0594" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-3808", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618168" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox before 1.5.0.5 and SeaMonkey before 1.0.3 allows remote Proxy AutoConfig (PAC) servers to execute code with elevated privileges via a PAC script that sets the FindProxyForURL function to an eval method on a privileged object.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3808" }, { "category": "external", "summary": "RHBZ#1618168", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618168" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3808", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3808" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3808", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3808" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-08-28T11:30:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0594" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2006-3809", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618169" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows scripts with the UniversalBrowserRead privilege to gain UniversalXPConnect privileges and possibly execute code or obtain sensitive data by reading into a privileged context.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3809" }, { "category": "external", "summary": "RHBZ#1618169", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618169" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3809", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3809" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3809", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3809" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-08-28T11:30:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0594" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-3810", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618170" } ], "notes": [ { "category": "description", "text": "Cross-site scripting (XSS) vulnerability in Mozilla Firefox 1.5 before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to inject arbitrary web script or HTML via the XPCNativeWrapper(window).Function construct.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3810" }, { "category": "external", "summary": "RHBZ#1618170", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618170" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3810", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3810" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3810", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3810" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-08-28T11:30:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0594" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2006-3811", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618171" } ], "notes": [ { "category": "description", "text": "Multiple vulnerabilities in Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via Javascript that leads to memory corruption, including (1) nsListControlFrame::FireMenuItemActiveEvent, (2) buffer overflows in the string class in out-of-memory conditions, (3) table row and column groups, (4) \"anonymous box selectors outside of UA stylesheets,\" (5) stale references to \"removed nodes,\" and (6) running the crypto.generateCRMFRequest callback on deleted context.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3811" }, { "category": "external", "summary": "RHBZ#1618171", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618171" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3811", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3811" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3811", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3811" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-08-28T11:30:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0594" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-3812", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "200455" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to reference remote files and possibly load chrome: URLs by tricking the user into copying or dragging links.", "title": "Vulnerability description" }, { "category": "summary", "text": "vulnerabilities: CVE-2006-{3113,3677,3801-3812}", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3812" }, { "category": "external", "summary": "RHBZ#200455", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=200455" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3812", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3812" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3812", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3812" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-08-28T11:30:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0594" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "vulnerabilities: CVE-2006-{3113,3677,3801-3812}" } ] }
rhsa-2006:0608
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated seamonkey packages that fix several security bugs are now available\nfor Red Hat Enterprise Linux 3.\n\nThis update has been rated as having critical security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "SeaMonkey is an open source Web browser, advanced email and newsgroup\nclient, IRC chat client, and HTML editor.\n\nSeveral flaws were found in the way SeaMonkey processed certain javascript\nactions. A malicious web page could execute arbitrary javascript\ninstructions with the permissions of \"chrome\", allowing the page to steal\nsensitive information or install browser malware. (CVE-2006-3807,\nCVE-2006-3809, CVE-2006-3812)\n\nSeveral denial of service flaws were found in the way SeaMonkey processed\ncertain web content. A malicious web page could crash the browser or\npossibly execute arbitrary code as the user running SeaMonkey.\n(CVE-2006-3801, CVE-2006-3677, CVE-2006-3113, CVE-2006-3803, CVE-2006-3805,\nCVE-2006-3806, CVE-2006-3811)\n\nA buffer overflow flaw was found in the way SeaMonkey Messenger displayed\nmalformed inline vcard attachments. If a victim viewed an email message\ncontaining a carefully crafted vcard, it was possible to execute arbitrary\ncode as the user running SeaMonkey Messenger. (CVE-2006-3804)\n\nSeveral flaws were found in the way SeaMonkey processed certain javascript\nactions. A malicious web page could conduct a cross-site scripting attack\nor steal sensitive information (such as cookies owned by other domains).\n(CVE-2006-3802, CVE-2006-3810)\n\nA flaw was found in the way SeaMonkey processed Proxy AutoConfig scripts. A\nmalicious Proxy AutoConfig server could execute arbitrary javascript\ninstructions with the permissions of \"chrome\", allowing the page to steal\nsensitive information or install browser malware. (CVE-2006-3808)\n\nUsers of SeaMonkey are advised to upgrade to this update, which contains\nSeaMonkey version 1.0.3 that corrects these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2006:0608", "url": "https://access.redhat.com/errata/RHSA-2006:0608" }, { "category": "external", "summary": "http://www.redhat.com/security/updates/classification/#critical", "url": "http://www.redhat.com/security/updates/classification/#critical" }, { "category": "external", "summary": "200253", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=200253" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2006/rhsa-2006_0608.json" } ], "title": "Red Hat Security Advisory: seamonkey security update", "tracking": { "current_release_date": "2025-09-10T13:38:44+00:00", "generator": { "date": "2025-09-10T13:38:44+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.7" } }, "id": "RHSA-2006:0608", "initial_release_date": "2006-07-27T19:53:00+00:00", "revision_history": [ { "date": "2006-07-27T19:53:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2006-07-27T00:00:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-09-10T13:38:44+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 3", "product": { "name": "Red Hat Enterprise Linux AS version 3", "product_id": "3AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::as" } } }, { "category": "product_name", "name": "Red Hat Desktop version 3", "product": { "name": "Red Hat Desktop version 3", "product_id": "3Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 3", "product": { "name": "Red Hat Enterprise Linux ES version 3", "product_id": "3ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 3", "product": { "name": "Red Hat Enterprise Linux WS version 3", "product_id": "3WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::ws" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "product": { "name": "seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "product_id": "seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nspr@1.0.3-0.el3.1?arch=ia64" } } }, { "category": "product_version", "name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "product": { "name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "product_id": "seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nss-devel@1.0.3-0.el3.1?arch=ia64" } } }, { "category": "product_version", "name": "seamonkey-devel-0:1.0.3-0.el3.1.ia64", "product": { "name": "seamonkey-devel-0:1.0.3-0.el3.1.ia64", "product_id": "seamonkey-devel-0:1.0.3-0.el3.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-devel@1.0.3-0.el3.1?arch=ia64" } } }, { "category": "product_version", "name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "product": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "product_id": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-dom-inspector@1.0.3-0.el3.1?arch=ia64" } } }, { "category": "product_version", "name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "product": { "name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "product_id": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nspr-devel@1.0.3-0.el3.1?arch=ia64" } } }, { "category": "product_version", "name": "seamonkey-0:1.0.3-0.el3.1.ia64", "product": { "name": "seamonkey-0:1.0.3-0.el3.1.ia64", "product_id": "seamonkey-0:1.0.3-0.el3.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey@1.0.3-0.el3.1?arch=ia64" } } }, { "category": "product_version", "name": "seamonkey-chat-0:1.0.3-0.el3.1.ia64", "product": { "name": "seamonkey-chat-0:1.0.3-0.el3.1.ia64", "product_id": "seamonkey-chat-0:1.0.3-0.el3.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-chat@1.0.3-0.el3.1?arch=ia64" } } }, { "category": "product_version", "name": "seamonkey-nss-0:1.0.3-0.el3.1.ia64", "product": { "name": "seamonkey-nss-0:1.0.3-0.el3.1.ia64", "product_id": "seamonkey-nss-0:1.0.3-0.el3.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nss@1.0.3-0.el3.1?arch=ia64" } } }, { "category": "product_version", "name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "product": { "name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "product_id": "seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-debuginfo@1.0.3-0.el3.1?arch=ia64" } } }, { "category": "product_version", "name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "product": { "name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "product_id": "seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-js-debugger@1.0.3-0.el3.1?arch=ia64" } } }, { "category": "product_version", "name": "seamonkey-mail-0:1.0.3-0.el3.1.ia64", "product": { "name": "seamonkey-mail-0:1.0.3-0.el3.1.ia64", "product_id": "seamonkey-mail-0:1.0.3-0.el3.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-mail@1.0.3-0.el3.1?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "seamonkey-nspr-0:1.0.3-0.el3.1.i386", "product": { "name": "seamonkey-nspr-0:1.0.3-0.el3.1.i386", "product_id": "seamonkey-nspr-0:1.0.3-0.el3.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nspr@1.0.3-0.el3.1?arch=i386" } } }, { "category": "product_version", "name": "seamonkey-nss-0:1.0.3-0.el3.1.i386", "product": { "name": "seamonkey-nss-0:1.0.3-0.el3.1.i386", "product_id": "seamonkey-nss-0:1.0.3-0.el3.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nss@1.0.3-0.el3.1?arch=i386" } } }, { "category": "product_version", "name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "product": { "name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "product_id": "seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-debuginfo@1.0.3-0.el3.1?arch=i386" } } }, { "category": "product_version", "name": "seamonkey-0:1.0.3-0.el3.1.i386", "product": { "name": "seamonkey-0:1.0.3-0.el3.1.i386", "product_id": "seamonkey-0:1.0.3-0.el3.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey@1.0.3-0.el3.1?arch=i386" } } }, { "category": "product_version", "name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "product": { "name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "product_id": "seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nss-devel@1.0.3-0.el3.1?arch=i386" } } }, { "category": "product_version", "name": "seamonkey-devel-0:1.0.3-0.el3.1.i386", "product": { "name": "seamonkey-devel-0:1.0.3-0.el3.1.i386", "product_id": "seamonkey-devel-0:1.0.3-0.el3.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-devel@1.0.3-0.el3.1?arch=i386" } } }, { "category": "product_version", "name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "product": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "product_id": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-dom-inspector@1.0.3-0.el3.1?arch=i386" } } }, { "category": "product_version", "name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "product": { "name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "product_id": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nspr-devel@1.0.3-0.el3.1?arch=i386" } } }, { "category": "product_version", "name": "seamonkey-chat-0:1.0.3-0.el3.1.i386", "product": { "name": "seamonkey-chat-0:1.0.3-0.el3.1.i386", "product_id": "seamonkey-chat-0:1.0.3-0.el3.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-chat@1.0.3-0.el3.1?arch=i386" } } }, { "category": "product_version", "name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "product": { "name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "product_id": "seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-js-debugger@1.0.3-0.el3.1?arch=i386" } } }, { "category": "product_version", "name": "seamonkey-mail-0:1.0.3-0.el3.1.i386", "product": { "name": "seamonkey-mail-0:1.0.3-0.el3.1.i386", "product_id": "seamonkey-mail-0:1.0.3-0.el3.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-mail@1.0.3-0.el3.1?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "product": { "name": "seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "product_id": "seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nspr@1.0.3-0.el3.1?arch=x86_64" } } }, { "category": "product_version", "name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "product": { "name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "product_id": "seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nss-devel@1.0.3-0.el3.1?arch=x86_64" } } }, { "category": "product_version", "name": "seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "product": { "name": "seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "product_id": "seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-devel@1.0.3-0.el3.1?arch=x86_64" } } }, { "category": "product_version", "name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "product": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "product_id": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-dom-inspector@1.0.3-0.el3.1?arch=x86_64" } } }, { "category": "product_version", "name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "product": { "name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "product_id": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nspr-devel@1.0.3-0.el3.1?arch=x86_64" } } }, { "category": "product_version", "name": "seamonkey-0:1.0.3-0.el3.1.x86_64", "product": { "name": "seamonkey-0:1.0.3-0.el3.1.x86_64", "product_id": "seamonkey-0:1.0.3-0.el3.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey@1.0.3-0.el3.1?arch=x86_64" } } }, { "category": "product_version", "name": "seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "product": { "name": "seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "product_id": "seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-chat@1.0.3-0.el3.1?arch=x86_64" } } }, { "category": "product_version", "name": "seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "product": { "name": "seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "product_id": "seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nss@1.0.3-0.el3.1?arch=x86_64" } } }, { "category": "product_version", "name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "product": { "name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "product_id": "seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-debuginfo@1.0.3-0.el3.1?arch=x86_64" } } }, { "category": "product_version", "name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "product": { "name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "product_id": "seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-js-debugger@1.0.3-0.el3.1?arch=x86_64" } } }, { "category": "product_version", "name": "seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "product": { "name": "seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "product_id": "seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-mail@1.0.3-0.el3.1?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "seamonkey-0:1.0.3-0.el3.1.src", "product": { "name": "seamonkey-0:1.0.3-0.el3.1.src", "product_id": "seamonkey-0:1.0.3-0.el3.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey@1.0.3-0.el3.1?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "product": { "name": "seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "product_id": "seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nspr@1.0.3-0.el3.1?arch=ppc" } } }, { "category": "product_version", "name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "product": { "name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "product_id": "seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nss-devel@1.0.3-0.el3.1?arch=ppc" } } }, { "category": "product_version", "name": "seamonkey-devel-0:1.0.3-0.el3.1.ppc", "product": { "name": "seamonkey-devel-0:1.0.3-0.el3.1.ppc", "product_id": "seamonkey-devel-0:1.0.3-0.el3.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-devel@1.0.3-0.el3.1?arch=ppc" } } }, { "category": "product_version", "name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "product": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "product_id": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-dom-inspector@1.0.3-0.el3.1?arch=ppc" } } }, { "category": "product_version", "name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "product": { "name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "product_id": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nspr-devel@1.0.3-0.el3.1?arch=ppc" } } }, { "category": "product_version", "name": "seamonkey-0:1.0.3-0.el3.1.ppc", "product": { "name": "seamonkey-0:1.0.3-0.el3.1.ppc", "product_id": "seamonkey-0:1.0.3-0.el3.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey@1.0.3-0.el3.1?arch=ppc" } } }, { "category": "product_version", "name": "seamonkey-chat-0:1.0.3-0.el3.1.ppc", "product": { "name": "seamonkey-chat-0:1.0.3-0.el3.1.ppc", "product_id": "seamonkey-chat-0:1.0.3-0.el3.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-chat@1.0.3-0.el3.1?arch=ppc" } } }, { "category": "product_version", "name": "seamonkey-nss-0:1.0.3-0.el3.1.ppc", "product": { "name": "seamonkey-nss-0:1.0.3-0.el3.1.ppc", "product_id": "seamonkey-nss-0:1.0.3-0.el3.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nss@1.0.3-0.el3.1?arch=ppc" } } }, { "category": "product_version", "name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "product": { "name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "product_id": "seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-debuginfo@1.0.3-0.el3.1?arch=ppc" } } }, { "category": "product_version", "name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "product": { "name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "product_id": "seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-js-debugger@1.0.3-0.el3.1?arch=ppc" } } }, { "category": "product_version", "name": "seamonkey-mail-0:1.0.3-0.el3.1.ppc", "product": { "name": "seamonkey-mail-0:1.0.3-0.el3.1.ppc", "product_id": "seamonkey-mail-0:1.0.3-0.el3.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-mail@1.0.3-0.el3.1?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "product": { "name": "seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "product_id": "seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nspr@1.0.3-0.el3.1?arch=s390x" } } }, { "category": "product_version", "name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "product": { "name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "product_id": "seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nss-devel@1.0.3-0.el3.1?arch=s390x" } } }, { "category": "product_version", "name": "seamonkey-devel-0:1.0.3-0.el3.1.s390x", "product": { "name": "seamonkey-devel-0:1.0.3-0.el3.1.s390x", "product_id": "seamonkey-devel-0:1.0.3-0.el3.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-devel@1.0.3-0.el3.1?arch=s390x" } } }, { "category": "product_version", "name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "product": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "product_id": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-dom-inspector@1.0.3-0.el3.1?arch=s390x" } } }, { "category": "product_version", "name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "product": { "name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "product_id": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nspr-devel@1.0.3-0.el3.1?arch=s390x" } } }, { "category": "product_version", "name": "seamonkey-0:1.0.3-0.el3.1.s390x", "product": { "name": "seamonkey-0:1.0.3-0.el3.1.s390x", "product_id": "seamonkey-0:1.0.3-0.el3.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey@1.0.3-0.el3.1?arch=s390x" } } }, { "category": "product_version", "name": "seamonkey-chat-0:1.0.3-0.el3.1.s390x", "product": { "name": "seamonkey-chat-0:1.0.3-0.el3.1.s390x", "product_id": "seamonkey-chat-0:1.0.3-0.el3.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-chat@1.0.3-0.el3.1?arch=s390x" } } }, { "category": "product_version", "name": "seamonkey-nss-0:1.0.3-0.el3.1.s390x", "product": { "name": "seamonkey-nss-0:1.0.3-0.el3.1.s390x", "product_id": "seamonkey-nss-0:1.0.3-0.el3.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nss@1.0.3-0.el3.1?arch=s390x" } } }, { "category": "product_version", "name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "product": { "name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "product_id": "seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-debuginfo@1.0.3-0.el3.1?arch=s390x" } } }, { "category": "product_version", "name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "product": { "name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "product_id": "seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-js-debugger@1.0.3-0.el3.1?arch=s390x" } } }, { "category": "product_version", "name": "seamonkey-mail-0:1.0.3-0.el3.1.s390x", "product": { "name": "seamonkey-mail-0:1.0.3-0.el3.1.s390x", "product_id": "seamonkey-mail-0:1.0.3-0.el3.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-mail@1.0.3-0.el3.1?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "seamonkey-nspr-0:1.0.3-0.el3.1.s390", "product": { "name": "seamonkey-nspr-0:1.0.3-0.el3.1.s390", "product_id": "seamonkey-nspr-0:1.0.3-0.el3.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nspr@1.0.3-0.el3.1?arch=s390" } } }, { "category": "product_version", "name": "seamonkey-nss-0:1.0.3-0.el3.1.s390", "product": { "name": "seamonkey-nss-0:1.0.3-0.el3.1.s390", "product_id": "seamonkey-nss-0:1.0.3-0.el3.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nss@1.0.3-0.el3.1?arch=s390" } } }, { "category": "product_version", "name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "product": { "name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "product_id": "seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-debuginfo@1.0.3-0.el3.1?arch=s390" } } }, { "category": "product_version", "name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "product": { "name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "product_id": "seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nss-devel@1.0.3-0.el3.1?arch=s390" } } }, { "category": "product_version", "name": "seamonkey-devel-0:1.0.3-0.el3.1.s390", "product": { "name": "seamonkey-devel-0:1.0.3-0.el3.1.s390", "product_id": "seamonkey-devel-0:1.0.3-0.el3.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-devel@1.0.3-0.el3.1?arch=s390" } } }, { "category": "product_version", "name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "product": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "product_id": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-dom-inspector@1.0.3-0.el3.1?arch=s390" } } }, { "category": "product_version", "name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "product": { "name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "product_id": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nspr-devel@1.0.3-0.el3.1?arch=s390" } } }, { "category": "product_version", "name": "seamonkey-0:1.0.3-0.el3.1.s390", "product": { "name": "seamonkey-0:1.0.3-0.el3.1.s390", "product_id": "seamonkey-0:1.0.3-0.el3.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey@1.0.3-0.el3.1?arch=s390" } } }, { "category": "product_version", "name": "seamonkey-chat-0:1.0.3-0.el3.1.s390", "product": { "name": "seamonkey-chat-0:1.0.3-0.el3.1.s390", "product_id": "seamonkey-chat-0:1.0.3-0.el3.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-chat@1.0.3-0.el3.1?arch=s390" } } }, { "category": "product_version", "name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "product": { "name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "product_id": "seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-js-debugger@1.0.3-0.el3.1?arch=s390" } } }, { "category": "product_version", "name": "seamonkey-mail-0:1.0.3-0.el3.1.s390", "product": { "name": "seamonkey-mail-0:1.0.3-0.el3.1.s390", "product_id": "seamonkey-mail-0:1.0.3-0.el3.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-mail@1.0.3-0.el3.1?arch=s390" } } } ], "category": "architecture", "name": "s390" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-0:1.0.3-0.el3.1.i386" }, "product_reference": "seamonkey-0:1.0.3-0.el3.1.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-0:1.0.3-0.el3.1.ia64" }, "product_reference": "seamonkey-0:1.0.3-0.el3.1.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-0:1.0.3-0.el3.1.ppc" }, "product_reference": "seamonkey-0:1.0.3-0.el3.1.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-0:1.0.3-0.el3.1.s390" }, "product_reference": "seamonkey-0:1.0.3-0.el3.1.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-0:1.0.3-0.el3.1.s390x" }, "product_reference": "seamonkey-0:1.0.3-0.el3.1.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el3.1.src as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-0:1.0.3-0.el3.1.src" }, "product_reference": "seamonkey-0:1.0.3-0.el3.1.src", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-0:1.0.3-0.el3.1.x86_64" }, "product_reference": "seamonkey-0:1.0.3-0.el3.1.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-chat-0:1.0.3-0.el3.1.i386" }, "product_reference": "seamonkey-chat-0:1.0.3-0.el3.1.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ia64" }, "product_reference": "seamonkey-chat-0:1.0.3-0.el3.1.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ppc" }, "product_reference": "seamonkey-chat-0:1.0.3-0.el3.1.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390" }, "product_reference": "seamonkey-chat-0:1.0.3-0.el3.1.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390x" }, "product_reference": "seamonkey-chat-0:1.0.3-0.el3.1.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64" }, "product_reference": "seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386" }, "product_reference": "seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64" }, "product_reference": "seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc" }, "product_reference": "seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390" }, "product_reference": "seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x" }, "product_reference": "seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64" }, "product_reference": "seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-devel-0:1.0.3-0.el3.1.i386" }, "product_reference": "seamonkey-devel-0:1.0.3-0.el3.1.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ia64" }, "product_reference": "seamonkey-devel-0:1.0.3-0.el3.1.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ppc" }, "product_reference": "seamonkey-devel-0:1.0.3-0.el3.1.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390" }, "product_reference": "seamonkey-devel-0:1.0.3-0.el3.1.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390x" }, "product_reference": "seamonkey-devel-0:1.0.3-0.el3.1.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64" }, "product_reference": "seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386" }, "product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64" }, "product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc" }, "product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390" }, "product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x" }, "product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64" }, "product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386" }, "product_reference": "seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64" }, "product_reference": "seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc" }, "product_reference": "seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390" }, "product_reference": "seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x" }, "product_reference": "seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64" }, "product_reference": "seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-mail-0:1.0.3-0.el3.1.i386" }, "product_reference": "seamonkey-mail-0:1.0.3-0.el3.1.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ia64" }, "product_reference": "seamonkey-mail-0:1.0.3-0.el3.1.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ppc" }, "product_reference": "seamonkey-mail-0:1.0.3-0.el3.1.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390" }, "product_reference": "seamonkey-mail-0:1.0.3-0.el3.1.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390x" }, "product_reference": "seamonkey-mail-0:1.0.3-0.el3.1.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64" }, "product_reference": "seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.i386" }, "product_reference": "seamonkey-nspr-0:1.0.3-0.el3.1.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64" }, "product_reference": "seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc" }, "product_reference": "seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390" }, "product_reference": "seamonkey-nspr-0:1.0.3-0.el3.1.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x" }, "product_reference": "seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64" }, "product_reference": "seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386" }, "product_reference": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64" }, "product_reference": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc" }, "product_reference": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390" }, "product_reference": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x" }, "product_reference": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64" }, "product_reference": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nss-0:1.0.3-0.el3.1.i386" }, "product_reference": "seamonkey-nss-0:1.0.3-0.el3.1.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ia64" }, "product_reference": "seamonkey-nss-0:1.0.3-0.el3.1.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ppc" }, "product_reference": "seamonkey-nss-0:1.0.3-0.el3.1.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390" }, "product_reference": "seamonkey-nss-0:1.0.3-0.el3.1.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390x" }, "product_reference": "seamonkey-nss-0:1.0.3-0.el3.1.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64" }, "product_reference": "seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386" }, "product_reference": "seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64" }, "product_reference": "seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc" }, "product_reference": "seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390" }, "product_reference": "seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x" }, "product_reference": "seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64" }, "product_reference": "seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el3.1.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-0:1.0.3-0.el3.1.i386" }, "product_reference": "seamonkey-0:1.0.3-0.el3.1.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-0:1.0.3-0.el3.1.ia64" }, "product_reference": "seamonkey-0:1.0.3-0.el3.1.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el3.1.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-0:1.0.3-0.el3.1.ppc" }, "product_reference": "seamonkey-0:1.0.3-0.el3.1.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el3.1.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390" }, "product_reference": "seamonkey-0:1.0.3-0.el3.1.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el3.1.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390x" }, "product_reference": "seamonkey-0:1.0.3-0.el3.1.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el3.1.src as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-0:1.0.3-0.el3.1.src" }, "product_reference": "seamonkey-0:1.0.3-0.el3.1.src", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-0:1.0.3-0.el3.1.x86_64" }, "product_reference": "seamonkey-0:1.0.3-0.el3.1.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.3-0.el3.1.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.i386" }, "product_reference": "seamonkey-chat-0:1.0.3-0.el3.1.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ia64" }, "product_reference": "seamonkey-chat-0:1.0.3-0.el3.1.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.3-0.el3.1.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ppc" }, "product_reference": "seamonkey-chat-0:1.0.3-0.el3.1.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.3-0.el3.1.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390" }, "product_reference": "seamonkey-chat-0:1.0.3-0.el3.1.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.3-0.el3.1.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390x" }, "product_reference": "seamonkey-chat-0:1.0.3-0.el3.1.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.x86_64" }, "product_reference": "seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386" }, "product_reference": "seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64" }, "product_reference": "seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc" }, "product_reference": "seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390" }, "product_reference": "seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x" }, "product_reference": "seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64" }, "product_reference": "seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.3-0.el3.1.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.i386" }, "product_reference": "seamonkey-devel-0:1.0.3-0.el3.1.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ia64" }, "product_reference": "seamonkey-devel-0:1.0.3-0.el3.1.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.3-0.el3.1.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ppc" }, "product_reference": "seamonkey-devel-0:1.0.3-0.el3.1.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.3-0.el3.1.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390" }, "product_reference": "seamonkey-devel-0:1.0.3-0.el3.1.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.3-0.el3.1.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390x" }, "product_reference": "seamonkey-devel-0:1.0.3-0.el3.1.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.x86_64" }, "product_reference": "seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386" }, "product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64" }, "product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc" }, "product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390" }, "product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x" }, "product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64" }, "product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386" }, "product_reference": "seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64" }, "product_reference": "seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc" }, "product_reference": "seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390" }, "product_reference": "seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x" }, "product_reference": "seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64" }, "product_reference": "seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.3-0.el3.1.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.i386" }, "product_reference": "seamonkey-mail-0:1.0.3-0.el3.1.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ia64" }, "product_reference": "seamonkey-mail-0:1.0.3-0.el3.1.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.3-0.el3.1.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ppc" }, "product_reference": "seamonkey-mail-0:1.0.3-0.el3.1.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.3-0.el3.1.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390" }, "product_reference": "seamonkey-mail-0:1.0.3-0.el3.1.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.3-0.el3.1.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390x" }, "product_reference": "seamonkey-mail-0:1.0.3-0.el3.1.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.x86_64" }, "product_reference": "seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.3-0.el3.1.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.i386" }, "product_reference": "seamonkey-nspr-0:1.0.3-0.el3.1.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ia64" }, "product_reference": "seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.3-0.el3.1.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ppc" }, "product_reference": "seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.3-0.el3.1.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390" }, "product_reference": "seamonkey-nspr-0:1.0.3-0.el3.1.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.3-0.el3.1.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390x" }, "product_reference": "seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64" }, "product_reference": "seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386" }, "product_reference": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64" }, "product_reference": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc" }, "product_reference": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390" }, "product_reference": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x" }, "product_reference": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64" }, "product_reference": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.3-0.el3.1.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.i386" }, "product_reference": "seamonkey-nss-0:1.0.3-0.el3.1.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ia64" }, "product_reference": "seamonkey-nss-0:1.0.3-0.el3.1.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.3-0.el3.1.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ppc" }, "product_reference": "seamonkey-nss-0:1.0.3-0.el3.1.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.3-0.el3.1.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390" }, "product_reference": "seamonkey-nss-0:1.0.3-0.el3.1.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.3-0.el3.1.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390x" }, "product_reference": "seamonkey-nss-0:1.0.3-0.el3.1.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.x86_64" }, "product_reference": "seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386" }, "product_reference": "seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64" }, "product_reference": "seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc" }, "product_reference": "seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390" }, "product_reference": "seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x" }, "product_reference": "seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64" }, "product_reference": "seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-0:1.0.3-0.el3.1.i386" }, "product_reference": "seamonkey-0:1.0.3-0.el3.1.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-0:1.0.3-0.el3.1.ia64" }, "product_reference": "seamonkey-0:1.0.3-0.el3.1.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-0:1.0.3-0.el3.1.ppc" }, "product_reference": "seamonkey-0:1.0.3-0.el3.1.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-0:1.0.3-0.el3.1.s390" }, "product_reference": "seamonkey-0:1.0.3-0.el3.1.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-0:1.0.3-0.el3.1.s390x" }, "product_reference": "seamonkey-0:1.0.3-0.el3.1.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el3.1.src as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-0:1.0.3-0.el3.1.src" }, "product_reference": "seamonkey-0:1.0.3-0.el3.1.src", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-0:1.0.3-0.el3.1.x86_64" }, "product_reference": "seamonkey-0:1.0.3-0.el3.1.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-chat-0:1.0.3-0.el3.1.i386" }, "product_reference": "seamonkey-chat-0:1.0.3-0.el3.1.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ia64" }, "product_reference": "seamonkey-chat-0:1.0.3-0.el3.1.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ppc" }, "product_reference": "seamonkey-chat-0:1.0.3-0.el3.1.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390" }, "product_reference": "seamonkey-chat-0:1.0.3-0.el3.1.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390x" }, "product_reference": "seamonkey-chat-0:1.0.3-0.el3.1.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-chat-0:1.0.3-0.el3.1.x86_64" }, "product_reference": "seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386" }, "product_reference": "seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64" }, "product_reference": "seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc" }, "product_reference": "seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390" }, "product_reference": "seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x" }, "product_reference": "seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64" }, "product_reference": "seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-devel-0:1.0.3-0.el3.1.i386" }, "product_reference": "seamonkey-devel-0:1.0.3-0.el3.1.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ia64" }, "product_reference": "seamonkey-devel-0:1.0.3-0.el3.1.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ppc" }, "product_reference": "seamonkey-devel-0:1.0.3-0.el3.1.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390" }, "product_reference": "seamonkey-devel-0:1.0.3-0.el3.1.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390x" }, "product_reference": "seamonkey-devel-0:1.0.3-0.el3.1.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-devel-0:1.0.3-0.el3.1.x86_64" }, "product_reference": "seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386" }, "product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64" }, "product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc" }, "product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390" }, "product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x" }, "product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64" }, "product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386" }, "product_reference": "seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64" }, "product_reference": "seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc" }, "product_reference": "seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390" }, "product_reference": "seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x" }, "product_reference": "seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64" }, "product_reference": "seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-mail-0:1.0.3-0.el3.1.i386" }, "product_reference": "seamonkey-mail-0:1.0.3-0.el3.1.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ia64" }, "product_reference": "seamonkey-mail-0:1.0.3-0.el3.1.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ppc" }, "product_reference": "seamonkey-mail-0:1.0.3-0.el3.1.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390" }, "product_reference": "seamonkey-mail-0:1.0.3-0.el3.1.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390x" }, "product_reference": "seamonkey-mail-0:1.0.3-0.el3.1.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-mail-0:1.0.3-0.el3.1.x86_64" }, "product_reference": "seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.i386" }, "product_reference": "seamonkey-nspr-0:1.0.3-0.el3.1.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ia64" }, "product_reference": "seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ppc" }, "product_reference": "seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390" }, "product_reference": "seamonkey-nspr-0:1.0.3-0.el3.1.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390x" }, "product_reference": "seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64" }, "product_reference": "seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386" }, "product_reference": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64" }, "product_reference": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc" }, "product_reference": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390" }, "product_reference": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x" }, "product_reference": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64" }, "product_reference": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nss-0:1.0.3-0.el3.1.i386" }, "product_reference": "seamonkey-nss-0:1.0.3-0.el3.1.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ia64" }, "product_reference": "seamonkey-nss-0:1.0.3-0.el3.1.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ppc" }, "product_reference": "seamonkey-nss-0:1.0.3-0.el3.1.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390" }, "product_reference": "seamonkey-nss-0:1.0.3-0.el3.1.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390x" }, "product_reference": "seamonkey-nss-0:1.0.3-0.el3.1.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nss-0:1.0.3-0.el3.1.x86_64" }, "product_reference": "seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386" }, "product_reference": "seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64" }, "product_reference": "seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc" }, "product_reference": "seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390" }, "product_reference": "seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x" }, "product_reference": "seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64" }, "product_reference": "seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-0:1.0.3-0.el3.1.i386" }, "product_reference": "seamonkey-0:1.0.3-0.el3.1.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-0:1.0.3-0.el3.1.ia64" }, "product_reference": "seamonkey-0:1.0.3-0.el3.1.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-0:1.0.3-0.el3.1.ppc" }, "product_reference": "seamonkey-0:1.0.3-0.el3.1.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-0:1.0.3-0.el3.1.s390" }, "product_reference": "seamonkey-0:1.0.3-0.el3.1.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-0:1.0.3-0.el3.1.s390x" }, "product_reference": "seamonkey-0:1.0.3-0.el3.1.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el3.1.src as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-0:1.0.3-0.el3.1.src" }, "product_reference": "seamonkey-0:1.0.3-0.el3.1.src", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-0:1.0.3-0.el3.1.x86_64" }, "product_reference": "seamonkey-0:1.0.3-0.el3.1.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-chat-0:1.0.3-0.el3.1.i386" }, "product_reference": "seamonkey-chat-0:1.0.3-0.el3.1.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ia64" }, "product_reference": "seamonkey-chat-0:1.0.3-0.el3.1.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ppc" }, "product_reference": "seamonkey-chat-0:1.0.3-0.el3.1.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390" }, "product_reference": "seamonkey-chat-0:1.0.3-0.el3.1.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390x" }, "product_reference": "seamonkey-chat-0:1.0.3-0.el3.1.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64" }, "product_reference": "seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386" }, "product_reference": "seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64" }, "product_reference": "seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc" }, "product_reference": "seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390" }, "product_reference": "seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x" }, "product_reference": "seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64" }, "product_reference": "seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-devel-0:1.0.3-0.el3.1.i386" }, "product_reference": "seamonkey-devel-0:1.0.3-0.el3.1.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ia64" }, "product_reference": "seamonkey-devel-0:1.0.3-0.el3.1.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ppc" }, "product_reference": "seamonkey-devel-0:1.0.3-0.el3.1.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390" }, "product_reference": "seamonkey-devel-0:1.0.3-0.el3.1.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390x" }, "product_reference": "seamonkey-devel-0:1.0.3-0.el3.1.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64" }, "product_reference": "seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386" }, "product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64" }, "product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc" }, "product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390" }, "product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x" }, "product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64" }, "product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386" }, "product_reference": "seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64" }, "product_reference": "seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc" }, "product_reference": "seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390" }, "product_reference": "seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x" }, "product_reference": "seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64" }, "product_reference": "seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-mail-0:1.0.3-0.el3.1.i386" }, "product_reference": "seamonkey-mail-0:1.0.3-0.el3.1.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ia64" }, "product_reference": "seamonkey-mail-0:1.0.3-0.el3.1.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ppc" }, "product_reference": "seamonkey-mail-0:1.0.3-0.el3.1.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390" }, "product_reference": "seamonkey-mail-0:1.0.3-0.el3.1.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390x" }, "product_reference": "seamonkey-mail-0:1.0.3-0.el3.1.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64" }, "product_reference": "seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.i386" }, "product_reference": "seamonkey-nspr-0:1.0.3-0.el3.1.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64" }, "product_reference": "seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc" }, "product_reference": "seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390" }, "product_reference": "seamonkey-nspr-0:1.0.3-0.el3.1.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x" }, "product_reference": "seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64" }, "product_reference": "seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386" }, "product_reference": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64" }, "product_reference": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc" }, "product_reference": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390" }, "product_reference": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x" }, "product_reference": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64" }, "product_reference": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nss-0:1.0.3-0.el3.1.i386" }, "product_reference": "seamonkey-nss-0:1.0.3-0.el3.1.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ia64" }, "product_reference": "seamonkey-nss-0:1.0.3-0.el3.1.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ppc" }, "product_reference": "seamonkey-nss-0:1.0.3-0.el3.1.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390" }, "product_reference": "seamonkey-nss-0:1.0.3-0.el3.1.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390x" }, "product_reference": "seamonkey-nss-0:1.0.3-0.el3.1.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64" }, "product_reference": "seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386" }, "product_reference": "seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64" }, "product_reference": "seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc" }, "product_reference": "seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390" }, "product_reference": "seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x" }, "product_reference": "seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64" }, "product_reference": "seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "relates_to_product_reference": "3WS" } ] }, "vulnerabilities": [ { "cve": "CVE-2006-3113", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618135" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox 1.5 before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via simultaneous XPCOM events, which causes a timer object to be deleted in a way that triggers memory corruption.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:seamonkey-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-0:1.0.3-0.el3.1.src", "3AS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-0:1.0.3-0.el3.1.src", "3Desktop:seamonkey-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-0:1.0.3-0.el3.1.src", "3ES:seamonkey-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-0:1.0.3-0.el3.1.src", "3WS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3113" }, { "category": "external", "summary": "RHBZ#1618135", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618135" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3113", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3113" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3113", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3113" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-27T19:53:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "3AS:seamonkey-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-0:1.0.3-0.el3.1.src", "3AS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-0:1.0.3-0.el3.1.src", "3Desktop:seamonkey-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-0:1.0.3-0.el3.1.src", "3ES:seamonkey-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-0:1.0.3-0.el3.1.src", "3WS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0608" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-3677", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618153" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox 1.5 before 1.5.0.5 and SeaMonkey before 1.0.3 allows remote attackers to execute arbitrary code by changing certain properties of the window navigator object (window.navigator) that are accessed when Java starts up, which causes a crash that leads to code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:seamonkey-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-0:1.0.3-0.el3.1.src", "3AS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-0:1.0.3-0.el3.1.src", "3Desktop:seamonkey-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-0:1.0.3-0.el3.1.src", "3ES:seamonkey-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-0:1.0.3-0.el3.1.src", "3WS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3677" }, { "category": "external", "summary": "RHBZ#1618153", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618153" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3677", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3677" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3677", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3677" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-27T19:53:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "3AS:seamonkey-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-0:1.0.3-0.el3.1.src", "3AS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-0:1.0.3-0.el3.1.src", "3Desktop:seamonkey-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-0:1.0.3-0.el3.1.src", "3ES:seamonkey-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-0:1.0.3-0.el3.1.src", "3WS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0608" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-3801", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618161" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox 1.5 before 1.5.0.5 and SeaMonkey before 1.0.3 does not properly clear a JavaScript reference to a frame or window, which leaves a pointer to a deleted object that allows remote attackers to execute arbitrary native code.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:seamonkey-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-0:1.0.3-0.el3.1.src", "3AS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-0:1.0.3-0.el3.1.src", "3Desktop:seamonkey-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-0:1.0.3-0.el3.1.src", "3ES:seamonkey-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-0:1.0.3-0.el3.1.src", "3WS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3801" }, { "category": "external", "summary": "RHBZ#1618161", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618161" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3801", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3801" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3801", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3801" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-27T19:53:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "3AS:seamonkey-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-0:1.0.3-0.el3.1.src", "3AS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-0:1.0.3-0.el3.1.src", "3Desktop:seamonkey-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-0:1.0.3-0.el3.1.src", "3ES:seamonkey-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-0:1.0.3-0.el3.1.src", "3WS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0608" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-3802", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618162" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to hijack native DOM methods from objects in another domain and conduct cross-site scripting (XSS) attacks using DOM methods of the top-level object.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:seamonkey-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-0:1.0.3-0.el3.1.src", "3AS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-0:1.0.3-0.el3.1.src", "3Desktop:seamonkey-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-0:1.0.3-0.el3.1.src", "3ES:seamonkey-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-0:1.0.3-0.el3.1.src", "3WS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3802" }, { "category": "external", "summary": "RHBZ#1618162", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618162" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3802", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3802" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3802", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3802" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-27T19:53:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "3AS:seamonkey-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-0:1.0.3-0.el3.1.src", "3AS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-0:1.0.3-0.el3.1.src", "3Desktop:seamonkey-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-0:1.0.3-0.el3.1.src", "3ES:seamonkey-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-0:1.0.3-0.el3.1.src", "3WS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0608" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2006-3803", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618163" } ], "notes": [ { "category": "description", "text": "Race condition in the JavaScript garbage collection in Mozilla Firefox 1.5 before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 might allow remote attackers to execute arbitrary code by causing the garbage collector to delete a temporary variable while it is still being used during the creation of a new Function object.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:seamonkey-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-0:1.0.3-0.el3.1.src", "3AS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-0:1.0.3-0.el3.1.src", "3Desktop:seamonkey-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-0:1.0.3-0.el3.1.src", "3ES:seamonkey-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-0:1.0.3-0.el3.1.src", "3WS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3803" }, { "category": "external", "summary": "RHBZ#1618163", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618163" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3803", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3803" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3803", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3803" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-27T19:53:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "3AS:seamonkey-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-0:1.0.3-0.el3.1.src", "3AS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-0:1.0.3-0.el3.1.src", "3Desktop:seamonkey-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-0:1.0.3-0.el3.1.src", "3ES:seamonkey-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-0:1.0.3-0.el3.1.src", "3WS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0608" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-3804", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618164" } ], "notes": [ { "category": "description", "text": "Heap-based buffer overflow in Mozilla Thunderbird before 1.5.0.5 and SeaMonkey before 1.0.3 allows remote attackers to cause a denial of service (crash) via a VCard attachment with a malformed base64 field, which copies more data than expected due to an integer underflow.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:seamonkey-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-0:1.0.3-0.el3.1.src", "3AS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-0:1.0.3-0.el3.1.src", "3Desktop:seamonkey-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-0:1.0.3-0.el3.1.src", "3ES:seamonkey-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-0:1.0.3-0.el3.1.src", "3WS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3804" }, { "category": "external", "summary": "RHBZ#1618164", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618164" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3804", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3804" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3804", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3804" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-27T19:53:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "3AS:seamonkey-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-0:1.0.3-0.el3.1.src", "3AS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-0:1.0.3-0.el3.1.src", "3Desktop:seamonkey-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-0:1.0.3-0.el3.1.src", "3ES:seamonkey-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-0:1.0.3-0.el3.1.src", "3WS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0608" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-3805", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618165" } ], "notes": [ { "category": "description", "text": "The Javascript engine in Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 might allow remote attackers to execute arbitrary code via vectors involving garbage collection that causes deletion of a temporary object that is still being used.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:seamonkey-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-0:1.0.3-0.el3.1.src", "3AS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-0:1.0.3-0.el3.1.src", "3Desktop:seamonkey-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-0:1.0.3-0.el3.1.src", "3ES:seamonkey-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-0:1.0.3-0.el3.1.src", "3WS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3805" }, { "category": "external", "summary": "RHBZ#1618165", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618165" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3805", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3805" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3805", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3805" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-27T19:53:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "3AS:seamonkey-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-0:1.0.3-0.el3.1.src", "3AS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-0:1.0.3-0.el3.1.src", "3Desktop:seamonkey-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-0:1.0.3-0.el3.1.src", "3ES:seamonkey-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-0:1.0.3-0.el3.1.src", "3WS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0608" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-3806", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618166" } ], "notes": [ { "category": "description", "text": "Multiple integer overflows in the Javascript engine in Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 might allow remote attackers to execute arbitrary code via vectors involving (1) long strings in the toSource method of the Object, Array, and String objects; and (2) unspecified \"string function arguments.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:seamonkey-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-0:1.0.3-0.el3.1.src", "3AS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-0:1.0.3-0.el3.1.src", "3Desktop:seamonkey-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-0:1.0.3-0.el3.1.src", "3ES:seamonkey-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-0:1.0.3-0.el3.1.src", "3WS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3806" }, { "category": "external", "summary": "RHBZ#1618166", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618166" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3806", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3806" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3806", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3806" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-27T19:53:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "3AS:seamonkey-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-0:1.0.3-0.el3.1.src", "3AS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-0:1.0.3-0.el3.1.src", "3Desktop:seamonkey-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-0:1.0.3-0.el3.1.src", "3ES:seamonkey-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-0:1.0.3-0.el3.1.src", "3WS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0608" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-3807", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618167" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to execute arbitrary code via script that changes the standard Object() constructor to return a reference to a privileged object and calling \"named JavaScript functions\" that use the constructor.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:seamonkey-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-0:1.0.3-0.el3.1.src", "3AS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-0:1.0.3-0.el3.1.src", "3Desktop:seamonkey-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-0:1.0.3-0.el3.1.src", "3ES:seamonkey-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-0:1.0.3-0.el3.1.src", "3WS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3807" }, { "category": "external", "summary": "RHBZ#1618167", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618167" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3807", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3807" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3807", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3807" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-27T19:53:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "3AS:seamonkey-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-0:1.0.3-0.el3.1.src", "3AS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-0:1.0.3-0.el3.1.src", "3Desktop:seamonkey-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-0:1.0.3-0.el3.1.src", "3ES:seamonkey-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-0:1.0.3-0.el3.1.src", "3WS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0608" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-3808", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618168" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox before 1.5.0.5 and SeaMonkey before 1.0.3 allows remote Proxy AutoConfig (PAC) servers to execute code with elevated privileges via a PAC script that sets the FindProxyForURL function to an eval method on a privileged object.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:seamonkey-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-0:1.0.3-0.el3.1.src", "3AS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-0:1.0.3-0.el3.1.src", "3Desktop:seamonkey-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-0:1.0.3-0.el3.1.src", "3ES:seamonkey-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-0:1.0.3-0.el3.1.src", "3WS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3808" }, { "category": "external", "summary": "RHBZ#1618168", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618168" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3808", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3808" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3808", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3808" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-27T19:53:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "3AS:seamonkey-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-0:1.0.3-0.el3.1.src", "3AS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-0:1.0.3-0.el3.1.src", "3Desktop:seamonkey-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-0:1.0.3-0.el3.1.src", "3ES:seamonkey-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-0:1.0.3-0.el3.1.src", "3WS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0608" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2006-3809", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618169" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows scripts with the UniversalBrowserRead privilege to gain UniversalXPConnect privileges and possibly execute code or obtain sensitive data by reading into a privileged context.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:seamonkey-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-0:1.0.3-0.el3.1.src", "3AS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-0:1.0.3-0.el3.1.src", "3Desktop:seamonkey-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-0:1.0.3-0.el3.1.src", "3ES:seamonkey-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-0:1.0.3-0.el3.1.src", "3WS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3809" }, { "category": "external", "summary": "RHBZ#1618169", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618169" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3809", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3809" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3809", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3809" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-27T19:53:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "3AS:seamonkey-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-0:1.0.3-0.el3.1.src", "3AS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-0:1.0.3-0.el3.1.src", "3Desktop:seamonkey-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-0:1.0.3-0.el3.1.src", "3ES:seamonkey-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-0:1.0.3-0.el3.1.src", "3WS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0608" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-3810", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618170" } ], "notes": [ { "category": "description", "text": "Cross-site scripting (XSS) vulnerability in Mozilla Firefox 1.5 before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to inject arbitrary web script or HTML via the XPCNativeWrapper(window).Function construct.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:seamonkey-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-0:1.0.3-0.el3.1.src", "3AS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-0:1.0.3-0.el3.1.src", "3Desktop:seamonkey-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-0:1.0.3-0.el3.1.src", "3ES:seamonkey-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-0:1.0.3-0.el3.1.src", "3WS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3810" }, { "category": "external", "summary": "RHBZ#1618170", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618170" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3810", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3810" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3810", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3810" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-27T19:53:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "3AS:seamonkey-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-0:1.0.3-0.el3.1.src", "3AS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-0:1.0.3-0.el3.1.src", "3Desktop:seamonkey-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-0:1.0.3-0.el3.1.src", "3ES:seamonkey-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-0:1.0.3-0.el3.1.src", "3WS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0608" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2006-3811", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618171" } ], "notes": [ { "category": "description", "text": "Multiple vulnerabilities in Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via Javascript that leads to memory corruption, including (1) nsListControlFrame::FireMenuItemActiveEvent, (2) buffer overflows in the string class in out-of-memory conditions, (3) table row and column groups, (4) \"anonymous box selectors outside of UA stylesheets,\" (5) stale references to \"removed nodes,\" and (6) running the crypto.generateCRMFRequest callback on deleted context.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:seamonkey-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-0:1.0.3-0.el3.1.src", "3AS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-0:1.0.3-0.el3.1.src", "3Desktop:seamonkey-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-0:1.0.3-0.el3.1.src", "3ES:seamonkey-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-0:1.0.3-0.el3.1.src", "3WS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3811" }, { "category": "external", "summary": "RHBZ#1618171", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618171" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3811", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3811" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3811", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3811" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-27T19:53:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "3AS:seamonkey-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-0:1.0.3-0.el3.1.src", "3AS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-0:1.0.3-0.el3.1.src", "3Desktop:seamonkey-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-0:1.0.3-0.el3.1.src", "3ES:seamonkey-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-0:1.0.3-0.el3.1.src", "3WS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0608" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-3812", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "200455" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to reference remote files and possibly load chrome: URLs by tricking the user into copying or dragging links.", "title": "Vulnerability description" }, { "category": "summary", "text": "vulnerabilities: CVE-2006-{3113,3677,3801-3812}", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:seamonkey-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-0:1.0.3-0.el3.1.src", "3AS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-0:1.0.3-0.el3.1.src", "3Desktop:seamonkey-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-0:1.0.3-0.el3.1.src", "3ES:seamonkey-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-0:1.0.3-0.el3.1.src", "3WS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3812" }, { "category": "external", "summary": "RHBZ#200455", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=200455" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3812", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3812" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3812", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3812" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-27T19:53:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "3AS:seamonkey-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-0:1.0.3-0.el3.1.src", "3AS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-0:1.0.3-0.el3.1.src", "3Desktop:seamonkey-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-0:1.0.3-0.el3.1.src", "3ES:seamonkey-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-0:1.0.3-0.el3.1.src", "3WS:seamonkey-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x", "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0608" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "vulnerabilities: CVE-2006-{3113,3677,3801-3812}" } ] }
RHSA-2006:0610
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated firefox packages that fix several security bugs are now available\nfor Red Hat Enterprise Linux 4.\n\nThis update has been rated as having critical security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "Mozilla Firefox is an open source Web browser.\n\nThe Mozilla Foundation has discontinued support for the Mozilla Firefox\n1.0 branch. This update deprecates the Mozilla Firefox 1.0 branch in\nRed Hat Enterprise Linux 4 in favor of the supported Mozilla Firefox\n1.5 branch.\n\nThis update also resolves a number of outstanding Firefox security issues:\n\nSeveral flaws were found in the way Firefox processed certain javascript\nactions. A malicious web page could execute arbitrary javascript\ninstructions with the permissions of \"chrome\", allowing the page to steal\nsensitive information or install browser malware. (CVE-2006-2776,\nCVE-2006-2784, CVE-2006-2785, CVE-2006-2787, CVE-2006-3807, CVE-2006-3809,\nCVE-2006-3812)\n\nSeveral denial of service flaws were found in the way Firefox processed\ncertain web content. A malicious web page could crash the browser or\npossibly execute arbitrary code as the user running Firefox.\n(CVE-2006-2779, CVE-2006-2780, CVE-2006-3801, CVE-2006-3677, CVE-2006-3113,\nCVE-2006-3803, CVE-2006-3805, CVE-2006-3806, CVE-2006-3811)\n\nA cross-site scripting flaw was found in the way Firefox processed\nUnicode Byte-Order-Mark (BOM) markers in UTF-8 web pages. A malicious web\npage could execute a script within the browser that a web input sanitizer\ncould miss due to a malformed \"script\" tag. (CVE-2006-2783)\n\nSeveral flaws were found in the way Firefox processed certain javascript\nactions. A malicious web page could conduct a cross-site scripting attack\nor steal sensitive information (such as cookies owned by other domains).\n(CVE-2006-3802, CVE-2006-3810)\n\nA form file upload flaw was found in the way Firefox handled javascript\ninput object mutation. A malicious web page could upload an arbitrary local\nfile at form submission time without user interaction. (CVE-2006-2782)\n\nA denial of service flaw was found in the way Firefox called the\ncrypto.signText() javascript function. A malicious web page could crash the\nbrowser if the victim had a client certificate loaded. (CVE-2006-2778)\n\nTwo HTTP response smuggling flaws were found in the way Firefox processed\ncertain invalid HTTP response headers. A malicious web site could return\nspecially crafted HTTP response headers which may bypass HTTP proxy\nrestrictions. (CVE-2006-2786)\n\nA flaw was found in the way Firefox processed Proxy AutoConfig scripts. A\nmalicious Proxy AutoConfig server could execute arbitrary javascript\ninstructions with the permissions of \"chrome\", allowing the page to steal\nsensitive information or install browser malware. (CVE-2006-3808)\n\nA double free flaw was found in the way the nsIX509::getRawDER method was\ncalled. If a victim visited a carefully crafted web page, it was possible\nto execute arbitrary code as the user running Firefox. (CVE-2006-2788)\n\nUsers of Firefox are advised to upgrade to this update, which contains\nFirefox version 1.5.0.5 that corrects these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2006:0610", "url": "https://access.redhat.com/errata/RHSA-2006:0610" }, { "category": "external", "summary": "http://www.redhat.com/security/updates/classification/#critical", "url": "http://www.redhat.com/security/updates/classification/#critical" }, { "category": "external", "summary": "193895", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=193895" }, { "category": "external", "summary": "196973", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=196973" }, { "category": "external", "summary": "200168", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=200168" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2006/rhsa-2006_0610.json" } ], "title": "Red Hat Security Advisory: firefox security update", "tracking": { "current_release_date": "2025-09-10T13:38:42+00:00", "generator": { "date": "2025-09-10T13:38:42+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.7" } }, "id": "RHSA-2006:0610", "initial_release_date": "2006-07-28T23:22:00+00:00", "revision_history": [ { "date": "2006-07-28T23:22:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2006-07-28T00:00:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-09-10T13:38:42+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 4", "product": { "name": "Red Hat Enterprise Linux AS version 4", "product_id": "4AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::as" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop version 4", "product": { "name": "Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 4", "product": { "name": "Red Hat Enterprise Linux ES version 4", "product_id": "4ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 4", "product": { "name": "Red Hat Enterprise Linux WS version 4", "product_id": "4WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::ws" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "firefox-0:1.5.0.5-0.el4.1.ia64", "product": { "name": "firefox-0:1.5.0.5-0.el4.1.ia64", "product_id": "firefox-0:1.5.0.5-0.el4.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox@1.5.0.5-0.el4.1?arch=ia64" } } }, { "category": "product_version", "name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "product": { "name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "product_id": "firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox-debuginfo@1.5.0.5-0.el4.1?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "firefox-0:1.5.0.5-0.el4.1.src", "product": { "name": "firefox-0:1.5.0.5-0.el4.1.src", "product_id": "firefox-0:1.5.0.5-0.el4.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox@1.5.0.5-0.el4.1?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "firefox-0:1.5.0.5-0.el4.1.x86_64", "product": { "name": "firefox-0:1.5.0.5-0.el4.1.x86_64", "product_id": "firefox-0:1.5.0.5-0.el4.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox@1.5.0.5-0.el4.1?arch=x86_64" } } }, { "category": "product_version", "name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "product": { "name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "product_id": "firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox-debuginfo@1.5.0.5-0.el4.1?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "firefox-0:1.5.0.5-0.el4.1.i386", "product": { "name": "firefox-0:1.5.0.5-0.el4.1.i386", "product_id": "firefox-0:1.5.0.5-0.el4.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox@1.5.0.5-0.el4.1?arch=i386" } } }, { "category": "product_version", "name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "product": { "name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "product_id": "firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox-debuginfo@1.5.0.5-0.el4.1?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "firefox-0:1.5.0.5-0.el4.1.ppc", "product": { "name": "firefox-0:1.5.0.5-0.el4.1.ppc", "product_id": "firefox-0:1.5.0.5-0.el4.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox@1.5.0.5-0.el4.1?arch=ppc" } } }, { "category": "product_version", "name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "product": { "name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "product_id": "firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox-debuginfo@1.5.0.5-0.el4.1?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "firefox-0:1.5.0.5-0.el4.1.s390x", "product": { "name": "firefox-0:1.5.0.5-0.el4.1.s390x", "product_id": "firefox-0:1.5.0.5-0.el4.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox@1.5.0.5-0.el4.1?arch=s390x" } } }, { "category": "product_version", "name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "product": { "name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "product_id": "firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox-debuginfo@1.5.0.5-0.el4.1?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "firefox-0:1.5.0.5-0.el4.1.s390", "product": { "name": "firefox-0:1.5.0.5-0.el4.1.s390", "product_id": "firefox-0:1.5.0.5-0.el4.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox@1.5.0.5-0.el4.1?arch=s390" } } }, { "category": "product_version", "name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "product": { "name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "product_id": "firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox-debuginfo@1.5.0.5-0.el4.1?arch=s390" } } } ], "category": "architecture", "name": "s390" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.5-0.el4.1.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:firefox-0:1.5.0.5-0.el4.1.i386" }, "product_reference": "firefox-0:1.5.0.5-0.el4.1.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.5-0.el4.1.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:firefox-0:1.5.0.5-0.el4.1.ia64" }, "product_reference": "firefox-0:1.5.0.5-0.el4.1.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.5-0.el4.1.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:firefox-0:1.5.0.5-0.el4.1.ppc" }, "product_reference": "firefox-0:1.5.0.5-0.el4.1.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.5-0.el4.1.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:firefox-0:1.5.0.5-0.el4.1.s390" }, "product_reference": "firefox-0:1.5.0.5-0.el4.1.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.5-0.el4.1.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:firefox-0:1.5.0.5-0.el4.1.s390x" }, "product_reference": "firefox-0:1.5.0.5-0.el4.1.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.5-0.el4.1.src as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:firefox-0:1.5.0.5-0.el4.1.src" }, "product_reference": "firefox-0:1.5.0.5-0.el4.1.src", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.5-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:firefox-0:1.5.0.5-0.el4.1.x86_64" }, "product_reference": "firefox-0:1.5.0.5-0.el4.1.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386" }, "product_reference": "firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64" }, "product_reference": "firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc" }, "product_reference": "firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390" }, "product_reference": "firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x" }, "product_reference": "firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64" }, "product_reference": "firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.5-0.el4.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:firefox-0:1.5.0.5-0.el4.1.i386" }, "product_reference": "firefox-0:1.5.0.5-0.el4.1.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.5-0.el4.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64" }, "product_reference": "firefox-0:1.5.0.5-0.el4.1.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.5-0.el4.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc" }, "product_reference": "firefox-0:1.5.0.5-0.el4.1.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.5-0.el4.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390" }, "product_reference": "firefox-0:1.5.0.5-0.el4.1.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.5-0.el4.1.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x" }, "product_reference": "firefox-0:1.5.0.5-0.el4.1.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.5-0.el4.1.src as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:firefox-0:1.5.0.5-0.el4.1.src" }, "product_reference": "firefox-0:1.5.0.5-0.el4.1.src", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.5-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64" }, "product_reference": "firefox-0:1.5.0.5-0.el4.1.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386" }, "product_reference": "firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64" }, "product_reference": "firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc" }, "product_reference": "firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390" }, "product_reference": "firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x" }, "product_reference": "firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64" }, "product_reference": "firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.5-0.el4.1.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:firefox-0:1.5.0.5-0.el4.1.i386" }, "product_reference": "firefox-0:1.5.0.5-0.el4.1.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.5-0.el4.1.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:firefox-0:1.5.0.5-0.el4.1.ia64" }, "product_reference": "firefox-0:1.5.0.5-0.el4.1.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.5-0.el4.1.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:firefox-0:1.5.0.5-0.el4.1.ppc" }, "product_reference": "firefox-0:1.5.0.5-0.el4.1.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.5-0.el4.1.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:firefox-0:1.5.0.5-0.el4.1.s390" }, "product_reference": "firefox-0:1.5.0.5-0.el4.1.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.5-0.el4.1.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:firefox-0:1.5.0.5-0.el4.1.s390x" }, "product_reference": "firefox-0:1.5.0.5-0.el4.1.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.5-0.el4.1.src as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:firefox-0:1.5.0.5-0.el4.1.src" }, "product_reference": "firefox-0:1.5.0.5-0.el4.1.src", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.5-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:firefox-0:1.5.0.5-0.el4.1.x86_64" }, "product_reference": "firefox-0:1.5.0.5-0.el4.1.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386" }, "product_reference": "firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64" }, "product_reference": "firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc" }, "product_reference": "firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390" }, "product_reference": "firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x" }, "product_reference": "firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64" }, "product_reference": "firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.5-0.el4.1.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:firefox-0:1.5.0.5-0.el4.1.i386" }, "product_reference": "firefox-0:1.5.0.5-0.el4.1.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.5-0.el4.1.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:firefox-0:1.5.0.5-0.el4.1.ia64" }, "product_reference": "firefox-0:1.5.0.5-0.el4.1.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.5-0.el4.1.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:firefox-0:1.5.0.5-0.el4.1.ppc" }, "product_reference": "firefox-0:1.5.0.5-0.el4.1.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.5-0.el4.1.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:firefox-0:1.5.0.5-0.el4.1.s390" }, "product_reference": "firefox-0:1.5.0.5-0.el4.1.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.5-0.el4.1.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:firefox-0:1.5.0.5-0.el4.1.s390x" }, "product_reference": "firefox-0:1.5.0.5-0.el4.1.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.5-0.el4.1.src as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:firefox-0:1.5.0.5-0.el4.1.src" }, "product_reference": "firefox-0:1.5.0.5-0.el4.1.src", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.5-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:firefox-0:1.5.0.5-0.el4.1.x86_64" }, "product_reference": "firefox-0:1.5.0.5-0.el4.1.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386" }, "product_reference": "firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64" }, "product_reference": "firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc" }, "product_reference": "firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390" }, "product_reference": "firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x" }, "product_reference": "firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64" }, "product_reference": "firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "relates_to_product_reference": "4WS" } ] }, "vulnerabilities": [ { "cve": "CVE-2006-2776", "discovery_date": "2006-05-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618112" } ], "notes": [ { "category": "description", "text": "Certain privileged UI code in Mozilla Firefox and Thunderbird before 1.5.0.4 calls content-defined setters on an object prototype, which allows remote attackers to execute code at a higher privilege than intended.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:firefox-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-0:1.5.0.5-0.el4.1.src", "4AS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-0:1.5.0.5-0.el4.1.src", "4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-0:1.5.0.5-0.el4.1.src", "4ES:firefox-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-0:1.5.0.5-0.el4.1.src", "4WS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2776" }, { "category": "external", "summary": "RHBZ#1618112", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618112" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2776", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2776" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2776", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2776" } ], "release_date": "2006-06-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-28T23:22:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:firefox-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-0:1.5.0.5-0.el4.1.src", "4AS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-0:1.5.0.5-0.el4.1.src", "4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-0:1.5.0.5-0.el4.1.src", "4ES:firefox-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-0:1.5.0.5-0.el4.1.src", "4WS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0610" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2006-2778", "discovery_date": "2006-05-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618113" } ], "notes": [ { "category": "description", "text": "The crypto.signText function in Mozilla Firefox and Thunderbird before 1.5.0.4 allows remote attackers to execute arbitrary code via certain optional Certificate Authority name arguments, which causes an invalid array index and triggers a buffer overflow.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:firefox-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-0:1.5.0.5-0.el4.1.src", "4AS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-0:1.5.0.5-0.el4.1.src", "4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-0:1.5.0.5-0.el4.1.src", "4ES:firefox-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-0:1.5.0.5-0.el4.1.src", "4WS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2778" }, { "category": "external", "summary": "RHBZ#1618113", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618113" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2778", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2778" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2778", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2778" } ], "release_date": "2006-06-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-28T23:22:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:firefox-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-0:1.5.0.5-0.el4.1.src", "4AS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-0:1.5.0.5-0.el4.1.src", "4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-0:1.5.0.5-0.el4.1.src", "4ES:firefox-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-0:1.5.0.5-0.el4.1.src", "4WS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0610" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2006-2779", "discovery_date": "2006-06-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618114" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox and Thunderbird before 1.5.0.4 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via (1) nested \u003coption\u003e tags in a select tag, (2) a DOMNodeRemoved mutation event, (3) \"Content-implemented tree views,\" (4) BoxObjects, (5) the XBL implementation, (6) an iframe that attempts to remove itself, which leads to memory corruption.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:firefox-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-0:1.5.0.5-0.el4.1.src", "4AS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-0:1.5.0.5-0.el4.1.src", "4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-0:1.5.0.5-0.el4.1.src", "4ES:firefox-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-0:1.5.0.5-0.el4.1.src", "4WS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2779" }, { "category": "external", "summary": "RHBZ#1618114", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618114" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2779", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2779" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2779", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2779" } ], "release_date": "2006-06-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-28T23:22:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:firefox-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-0:1.5.0.5-0.el4.1.src", "4AS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-0:1.5.0.5-0.el4.1.src", "4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-0:1.5.0.5-0.el4.1.src", "4ES:firefox-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-0:1.5.0.5-0.el4.1.src", "4WS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0610" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-2780", "discovery_date": "2006-06-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618115" } ], "notes": [ { "category": "description", "text": "Integer overflow in Mozilla Firefox and Thunderbird before 1.5.0.4 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via \"jsstr tagify,\" which leads to memory corruption.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:firefox-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-0:1.5.0.5-0.el4.1.src", "4AS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-0:1.5.0.5-0.el4.1.src", "4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-0:1.5.0.5-0.el4.1.src", "4ES:firefox-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-0:1.5.0.5-0.el4.1.src", "4WS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2780" }, { "category": "external", "summary": "RHBZ#1618115", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618115" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2780", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2780" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2780", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2780" } ], "release_date": "2006-06-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-28T23:22:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:firefox-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-0:1.5.0.5-0.el4.1.src", "4AS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-0:1.5.0.5-0.el4.1.src", "4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-0:1.5.0.5-0.el4.1.src", "4ES:firefox-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-0:1.5.0.5-0.el4.1.src", "4WS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0610" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-2782", "discovery_date": "2006-05-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618116" } ], "notes": [ { "category": "description", "text": "Firefox 1.5.0.2 does not fix all test cases associated with CVE-2006-1729, which allows remote attackers to read arbitrary files by inserting the target filename into a text box, then turning that box into a file upload control.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:firefox-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-0:1.5.0.5-0.el4.1.src", "4AS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-0:1.5.0.5-0.el4.1.src", "4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-0:1.5.0.5-0.el4.1.src", "4ES:firefox-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-0:1.5.0.5-0.el4.1.src", "4WS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2782" }, { "category": "external", "summary": "RHBZ#1618116", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618116" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2782", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2782" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2782", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2782" } ], "release_date": "2006-06-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-28T23:22:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:firefox-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-0:1.5.0.5-0.el4.1.src", "4AS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-0:1.5.0.5-0.el4.1.src", "4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-0:1.5.0.5-0.el4.1.src", "4ES:firefox-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-0:1.5.0.5-0.el4.1.src", "4WS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0610" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2006-2783", "discovery_date": "2006-05-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618117" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox and Thunderbird before 1.5.0.4 strip the Unicode Byte-order-Mark (BOM) from a UTF-8 page before the page is passed to the parser, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a BOM sequence in the middle of a dangerous tag such as SCRIPT.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:firefox-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-0:1.5.0.5-0.el4.1.src", "4AS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-0:1.5.0.5-0.el4.1.src", "4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-0:1.5.0.5-0.el4.1.src", "4ES:firefox-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-0:1.5.0.5-0.el4.1.src", "4WS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2783" }, { "category": "external", "summary": "RHBZ#1618117", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618117" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2783", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2783" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2783", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2783" } ], "release_date": "2006-06-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-28T23:22:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:firefox-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-0:1.5.0.5-0.el4.1.src", "4AS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-0:1.5.0.5-0.el4.1.src", "4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-0:1.5.0.5-0.el4.1.src", "4ES:firefox-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-0:1.5.0.5-0.el4.1.src", "4WS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0610" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2006-2784", "discovery_date": "2006-05-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618118" } ], "notes": [ { "category": "description", "text": "The PLUGINSPAGE functionality in Mozilla Firefox before 1.5.0.4 allows remote user-assisted attackers to execute privileged code by tricking a user into installing missing plugins and selecting the \"Manual Install\" button, then using nested javascript: URLs. NOTE: the manual install button is used for downloading software from a remote web site, so this issue would not cross privilege boundaries if the user progresses to the point of installing malicious software from the attacker-controlled site.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:firefox-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-0:1.5.0.5-0.el4.1.src", "4AS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-0:1.5.0.5-0.el4.1.src", "4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-0:1.5.0.5-0.el4.1.src", "4ES:firefox-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-0:1.5.0.5-0.el4.1.src", "4WS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2784" }, { "category": "external", "summary": "RHBZ#1618118", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618118" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2784", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2784" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2784", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2784" } ], "release_date": "2006-06-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-28T23:22:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:firefox-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-0:1.5.0.5-0.el4.1.src", "4AS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-0:1.5.0.5-0.el4.1.src", "4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-0:1.5.0.5-0.el4.1.src", "4ES:firefox-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-0:1.5.0.5-0.el4.1.src", "4WS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0610" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2006-2785", "discovery_date": "2006-05-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618119" } ], "notes": [ { "category": "description", "text": "Cross-site scripting (XSS) vulnerability in Mozilla Firefox before 1.5.0.4 allows user-assisted remote attackers to inject arbitrary web script or HTML by tricking a user into (1) performing a \"View Image\" on a broken image in which the SRC attribute contains a Javascript URL, or (2) selecting \"Show only this frame\" on a frame whose SRC attribute contains a Javascript URL.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:firefox-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-0:1.5.0.5-0.el4.1.src", "4AS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-0:1.5.0.5-0.el4.1.src", "4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-0:1.5.0.5-0.el4.1.src", "4ES:firefox-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-0:1.5.0.5-0.el4.1.src", "4WS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2785" }, { "category": "external", "summary": "RHBZ#1618119", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618119" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2785", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2785" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2785", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2785" } ], "release_date": "2006-06-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-28T23:22:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:firefox-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-0:1.5.0.5-0.el4.1.src", "4AS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-0:1.5.0.5-0.el4.1.src", "4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-0:1.5.0.5-0.el4.1.src", "4ES:firefox-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-0:1.5.0.5-0.el4.1.src", "4WS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0610" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2006-2786", "discovery_date": "2006-05-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618120" } ], "notes": [ { "category": "description", "text": "HTTP response smuggling vulnerability in Mozilla Firefox and Thunderbird before 1.5.0.4, when used with certain proxy servers, allows remote attackers to cause Firefox to interpret certain responses as if they were responses from two different sites via (1) invalid HTTP response headers with spaces between the header name and the colon, which might not be ignored in some cases, or (2) HTTP 1.1 headers through an HTTP 1.0 proxy, which are ignored by the proxy but processed by the client.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:firefox-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-0:1.5.0.5-0.el4.1.src", "4AS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-0:1.5.0.5-0.el4.1.src", "4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-0:1.5.0.5-0.el4.1.src", "4ES:firefox-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-0:1.5.0.5-0.el4.1.src", "4WS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2786" }, { "category": "external", "summary": "RHBZ#1618120", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618120" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2786", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2786" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2786", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2786" } ], "release_date": "2006-06-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-28T23:22:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:firefox-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-0:1.5.0.5-0.el4.1.src", "4AS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-0:1.5.0.5-0.el4.1.src", "4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-0:1.5.0.5-0.el4.1.src", "4ES:firefox-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-0:1.5.0.5-0.el4.1.src", "4WS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0610" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2006-2787", "discovery_date": "2006-05-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618121" } ], "notes": [ { "category": "description", "text": "EvalInSandbox in Mozilla Firefox and Thunderbird before 1.5.0.4 allows remote attackers to gain privileges via javascript that calls the valueOf method on objects that were created outside of the sandbox.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:firefox-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-0:1.5.0.5-0.el4.1.src", "4AS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-0:1.5.0.5-0.el4.1.src", "4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-0:1.5.0.5-0.el4.1.src", "4ES:firefox-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-0:1.5.0.5-0.el4.1.src", "4WS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2787" }, { "category": "external", "summary": "RHBZ#1618121", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618121" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2787", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2787" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2787", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2787" } ], "release_date": "2006-06-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-28T23:22:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:firefox-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-0:1.5.0.5-0.el4.1.src", "4AS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-0:1.5.0.5-0.el4.1.src", "4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-0:1.5.0.5-0.el4.1.src", "4ES:firefox-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-0:1.5.0.5-0.el4.1.src", "4WS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0610" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2006-2788", "discovery_date": "2006-05-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618122" } ], "notes": [ { "category": "description", "text": "Double free vulnerability in the getRawDER function for nsIX509Cert in Firefox allows remote attackers to cause a denial of service (hang) and possibly execute arbitrary code via certain Javascript code.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:firefox-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-0:1.5.0.5-0.el4.1.src", "4AS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-0:1.5.0.5-0.el4.1.src", "4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-0:1.5.0.5-0.el4.1.src", "4ES:firefox-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-0:1.5.0.5-0.el4.1.src", "4WS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2788" }, { "category": "external", "summary": "RHBZ#1618122", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618122" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2788", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2788" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2788", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2788" } ], "release_date": "2006-06-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-28T23:22:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:firefox-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-0:1.5.0.5-0.el4.1.src", "4AS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-0:1.5.0.5-0.el4.1.src", "4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-0:1.5.0.5-0.el4.1.src", "4ES:firefox-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-0:1.5.0.5-0.el4.1.src", "4WS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0610" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2006-3113", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618135" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox 1.5 before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via simultaneous XPCOM events, which causes a timer object to be deleted in a way that triggers memory corruption.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:firefox-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-0:1.5.0.5-0.el4.1.src", "4AS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-0:1.5.0.5-0.el4.1.src", "4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-0:1.5.0.5-0.el4.1.src", "4ES:firefox-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-0:1.5.0.5-0.el4.1.src", "4WS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3113" }, { "category": "external", "summary": "RHBZ#1618135", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618135" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3113", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3113" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3113", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3113" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-28T23:22:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:firefox-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-0:1.5.0.5-0.el4.1.src", "4AS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-0:1.5.0.5-0.el4.1.src", "4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-0:1.5.0.5-0.el4.1.src", "4ES:firefox-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-0:1.5.0.5-0.el4.1.src", "4WS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0610" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-3677", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618153" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox 1.5 before 1.5.0.5 and SeaMonkey before 1.0.3 allows remote attackers to execute arbitrary code by changing certain properties of the window navigator object (window.navigator) that are accessed when Java starts up, which causes a crash that leads to code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:firefox-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-0:1.5.0.5-0.el4.1.src", "4AS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-0:1.5.0.5-0.el4.1.src", "4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-0:1.5.0.5-0.el4.1.src", "4ES:firefox-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-0:1.5.0.5-0.el4.1.src", "4WS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3677" }, { "category": "external", "summary": "RHBZ#1618153", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618153" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3677", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3677" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3677", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3677" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-28T23:22:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:firefox-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-0:1.5.0.5-0.el4.1.src", "4AS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-0:1.5.0.5-0.el4.1.src", "4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-0:1.5.0.5-0.el4.1.src", "4ES:firefox-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-0:1.5.0.5-0.el4.1.src", "4WS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0610" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-3801", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618161" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox 1.5 before 1.5.0.5 and SeaMonkey before 1.0.3 does not properly clear a JavaScript reference to a frame or window, which leaves a pointer to a deleted object that allows remote attackers to execute arbitrary native code.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:firefox-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-0:1.5.0.5-0.el4.1.src", "4AS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-0:1.5.0.5-0.el4.1.src", "4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-0:1.5.0.5-0.el4.1.src", "4ES:firefox-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-0:1.5.0.5-0.el4.1.src", "4WS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3801" }, { "category": "external", "summary": "RHBZ#1618161", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618161" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3801", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3801" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3801", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3801" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-28T23:22:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:firefox-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-0:1.5.0.5-0.el4.1.src", "4AS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-0:1.5.0.5-0.el4.1.src", "4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-0:1.5.0.5-0.el4.1.src", "4ES:firefox-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-0:1.5.0.5-0.el4.1.src", "4WS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0610" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-3802", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618162" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to hijack native DOM methods from objects in another domain and conduct cross-site scripting (XSS) attacks using DOM methods of the top-level object.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:firefox-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-0:1.5.0.5-0.el4.1.src", "4AS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-0:1.5.0.5-0.el4.1.src", "4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-0:1.5.0.5-0.el4.1.src", "4ES:firefox-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-0:1.5.0.5-0.el4.1.src", "4WS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3802" }, { "category": "external", "summary": "RHBZ#1618162", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618162" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3802", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3802" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3802", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3802" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-28T23:22:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:firefox-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-0:1.5.0.5-0.el4.1.src", "4AS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-0:1.5.0.5-0.el4.1.src", "4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-0:1.5.0.5-0.el4.1.src", "4ES:firefox-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-0:1.5.0.5-0.el4.1.src", "4WS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0610" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2006-3803", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618163" } ], "notes": [ { "category": "description", "text": "Race condition in the JavaScript garbage collection in Mozilla Firefox 1.5 before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 might allow remote attackers to execute arbitrary code by causing the garbage collector to delete a temporary variable while it is still being used during the creation of a new Function object.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:firefox-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-0:1.5.0.5-0.el4.1.src", "4AS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-0:1.5.0.5-0.el4.1.src", "4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-0:1.5.0.5-0.el4.1.src", "4ES:firefox-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-0:1.5.0.5-0.el4.1.src", "4WS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3803" }, { "category": "external", "summary": "RHBZ#1618163", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618163" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3803", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3803" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3803", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3803" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-28T23:22:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:firefox-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-0:1.5.0.5-0.el4.1.src", "4AS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-0:1.5.0.5-0.el4.1.src", "4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-0:1.5.0.5-0.el4.1.src", "4ES:firefox-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-0:1.5.0.5-0.el4.1.src", "4WS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0610" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-3805", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618165" } ], "notes": [ { "category": "description", "text": "The Javascript engine in Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 might allow remote attackers to execute arbitrary code via vectors involving garbage collection that causes deletion of a temporary object that is still being used.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:firefox-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-0:1.5.0.5-0.el4.1.src", "4AS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-0:1.5.0.5-0.el4.1.src", "4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-0:1.5.0.5-0.el4.1.src", "4ES:firefox-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-0:1.5.0.5-0.el4.1.src", "4WS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3805" }, { "category": "external", "summary": "RHBZ#1618165", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618165" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3805", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3805" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3805", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3805" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-28T23:22:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:firefox-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-0:1.5.0.5-0.el4.1.src", "4AS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-0:1.5.0.5-0.el4.1.src", "4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-0:1.5.0.5-0.el4.1.src", "4ES:firefox-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-0:1.5.0.5-0.el4.1.src", "4WS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0610" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-3806", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618166" } ], "notes": [ { "category": "description", "text": "Multiple integer overflows in the Javascript engine in Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 might allow remote attackers to execute arbitrary code via vectors involving (1) long strings in the toSource method of the Object, Array, and String objects; and (2) unspecified \"string function arguments.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:firefox-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-0:1.5.0.5-0.el4.1.src", "4AS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-0:1.5.0.5-0.el4.1.src", "4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-0:1.5.0.5-0.el4.1.src", "4ES:firefox-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-0:1.5.0.5-0.el4.1.src", "4WS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3806" }, { "category": "external", "summary": "RHBZ#1618166", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618166" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3806", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3806" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3806", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3806" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-28T23:22:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:firefox-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-0:1.5.0.5-0.el4.1.src", "4AS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-0:1.5.0.5-0.el4.1.src", "4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-0:1.5.0.5-0.el4.1.src", "4ES:firefox-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-0:1.5.0.5-0.el4.1.src", "4WS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0610" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-3807", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618167" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to execute arbitrary code via script that changes the standard Object() constructor to return a reference to a privileged object and calling \"named JavaScript functions\" that use the constructor.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:firefox-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-0:1.5.0.5-0.el4.1.src", "4AS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-0:1.5.0.5-0.el4.1.src", "4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-0:1.5.0.5-0.el4.1.src", "4ES:firefox-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-0:1.5.0.5-0.el4.1.src", "4WS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3807" }, { "category": "external", "summary": "RHBZ#1618167", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618167" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3807", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3807" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3807", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3807" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-28T23:22:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:firefox-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-0:1.5.0.5-0.el4.1.src", "4AS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-0:1.5.0.5-0.el4.1.src", "4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-0:1.5.0.5-0.el4.1.src", "4ES:firefox-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-0:1.5.0.5-0.el4.1.src", "4WS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0610" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-3808", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618168" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox before 1.5.0.5 and SeaMonkey before 1.0.3 allows remote Proxy AutoConfig (PAC) servers to execute code with elevated privileges via a PAC script that sets the FindProxyForURL function to an eval method on a privileged object.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:firefox-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-0:1.5.0.5-0.el4.1.src", "4AS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-0:1.5.0.5-0.el4.1.src", "4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-0:1.5.0.5-0.el4.1.src", "4ES:firefox-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-0:1.5.0.5-0.el4.1.src", "4WS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3808" }, { "category": "external", "summary": "RHBZ#1618168", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618168" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3808", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3808" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3808", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3808" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-28T23:22:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:firefox-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-0:1.5.0.5-0.el4.1.src", "4AS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-0:1.5.0.5-0.el4.1.src", "4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-0:1.5.0.5-0.el4.1.src", "4ES:firefox-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-0:1.5.0.5-0.el4.1.src", "4WS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0610" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2006-3809", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618169" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows scripts with the UniversalBrowserRead privilege to gain UniversalXPConnect privileges and possibly execute code or obtain sensitive data by reading into a privileged context.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:firefox-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-0:1.5.0.5-0.el4.1.src", "4AS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-0:1.5.0.5-0.el4.1.src", "4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-0:1.5.0.5-0.el4.1.src", "4ES:firefox-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-0:1.5.0.5-0.el4.1.src", "4WS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3809" }, { "category": "external", "summary": "RHBZ#1618169", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618169" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3809", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3809" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3809", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3809" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-28T23:22:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:firefox-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-0:1.5.0.5-0.el4.1.src", "4AS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-0:1.5.0.5-0.el4.1.src", "4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-0:1.5.0.5-0.el4.1.src", "4ES:firefox-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-0:1.5.0.5-0.el4.1.src", "4WS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0610" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-3810", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618170" } ], "notes": [ { "category": "description", "text": "Cross-site scripting (XSS) vulnerability in Mozilla Firefox 1.5 before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to inject arbitrary web script or HTML via the XPCNativeWrapper(window).Function construct.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:firefox-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-0:1.5.0.5-0.el4.1.src", "4AS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-0:1.5.0.5-0.el4.1.src", "4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-0:1.5.0.5-0.el4.1.src", "4ES:firefox-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-0:1.5.0.5-0.el4.1.src", "4WS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3810" }, { "category": "external", "summary": "RHBZ#1618170", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618170" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3810", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3810" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3810", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3810" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-28T23:22:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:firefox-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-0:1.5.0.5-0.el4.1.src", "4AS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-0:1.5.0.5-0.el4.1.src", "4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-0:1.5.0.5-0.el4.1.src", "4ES:firefox-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-0:1.5.0.5-0.el4.1.src", "4WS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0610" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2006-3811", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618171" } ], "notes": [ { "category": "description", "text": "Multiple vulnerabilities in Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via Javascript that leads to memory corruption, including (1) nsListControlFrame::FireMenuItemActiveEvent, (2) buffer overflows in the string class in out-of-memory conditions, (3) table row and column groups, (4) \"anonymous box selectors outside of UA stylesheets,\" (5) stale references to \"removed nodes,\" and (6) running the crypto.generateCRMFRequest callback on deleted context.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:firefox-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-0:1.5.0.5-0.el4.1.src", "4AS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-0:1.5.0.5-0.el4.1.src", "4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-0:1.5.0.5-0.el4.1.src", "4ES:firefox-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-0:1.5.0.5-0.el4.1.src", "4WS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3811" }, { "category": "external", "summary": "RHBZ#1618171", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618171" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3811", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3811" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3811", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3811" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-28T23:22:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:firefox-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-0:1.5.0.5-0.el4.1.src", "4AS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-0:1.5.0.5-0.el4.1.src", "4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-0:1.5.0.5-0.el4.1.src", "4ES:firefox-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-0:1.5.0.5-0.el4.1.src", "4WS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0610" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-3812", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "200455" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to reference remote files and possibly load chrome: URLs by tricking the user into copying or dragging links.", "title": "Vulnerability description" }, { "category": "summary", "text": "vulnerabilities: CVE-2006-{3113,3677,3801-3812}", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:firefox-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-0:1.5.0.5-0.el4.1.src", "4AS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-0:1.5.0.5-0.el4.1.src", "4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-0:1.5.0.5-0.el4.1.src", "4ES:firefox-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-0:1.5.0.5-0.el4.1.src", "4WS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3812" }, { "category": "external", "summary": "RHBZ#200455", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=200455" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3812", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3812" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3812", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3812" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-28T23:22:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:firefox-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-0:1.5.0.5-0.el4.1.src", "4AS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-0:1.5.0.5-0.el4.1.src", "4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-0:1.5.0.5-0.el4.1.src", "4ES:firefox-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-0:1.5.0.5-0.el4.1.src", "4WS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0610" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "vulnerabilities: CVE-2006-{3113,3677,3801-3812}" } ] }
rhsa-2006_0610
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated firefox packages that fix several security bugs are now available\nfor Red Hat Enterprise Linux 4.\n\nThis update has been rated as having critical security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "Mozilla Firefox is an open source Web browser.\n\nThe Mozilla Foundation has discontinued support for the Mozilla Firefox\n1.0 branch. This update deprecates the Mozilla Firefox 1.0 branch in\nRed Hat Enterprise Linux 4 in favor of the supported Mozilla Firefox\n1.5 branch.\n\nThis update also resolves a number of outstanding Firefox security issues:\n\nSeveral flaws were found in the way Firefox processed certain javascript\nactions. A malicious web page could execute arbitrary javascript\ninstructions with the permissions of \"chrome\", allowing the page to steal\nsensitive information or install browser malware. (CVE-2006-2776,\nCVE-2006-2784, CVE-2006-2785, CVE-2006-2787, CVE-2006-3807, CVE-2006-3809,\nCVE-2006-3812)\n\nSeveral denial of service flaws were found in the way Firefox processed\ncertain web content. A malicious web page could crash the browser or\npossibly execute arbitrary code as the user running Firefox.\n(CVE-2006-2779, CVE-2006-2780, CVE-2006-3801, CVE-2006-3677, CVE-2006-3113,\nCVE-2006-3803, CVE-2006-3805, CVE-2006-3806, CVE-2006-3811)\n\nA cross-site scripting flaw was found in the way Firefox processed\nUnicode Byte-Order-Mark (BOM) markers in UTF-8 web pages. A malicious web\npage could execute a script within the browser that a web input sanitizer\ncould miss due to a malformed \"script\" tag. (CVE-2006-2783)\n\nSeveral flaws were found in the way Firefox processed certain javascript\nactions. A malicious web page could conduct a cross-site scripting attack\nor steal sensitive information (such as cookies owned by other domains).\n(CVE-2006-3802, CVE-2006-3810)\n\nA form file upload flaw was found in the way Firefox handled javascript\ninput object mutation. A malicious web page could upload an arbitrary local\nfile at form submission time without user interaction. (CVE-2006-2782)\n\nA denial of service flaw was found in the way Firefox called the\ncrypto.signText() javascript function. A malicious web page could crash the\nbrowser if the victim had a client certificate loaded. (CVE-2006-2778)\n\nTwo HTTP response smuggling flaws were found in the way Firefox processed\ncertain invalid HTTP response headers. A malicious web site could return\nspecially crafted HTTP response headers which may bypass HTTP proxy\nrestrictions. (CVE-2006-2786)\n\nA flaw was found in the way Firefox processed Proxy AutoConfig scripts. A\nmalicious Proxy AutoConfig server could execute arbitrary javascript\ninstructions with the permissions of \"chrome\", allowing the page to steal\nsensitive information or install browser malware. (CVE-2006-3808)\n\nA double free flaw was found in the way the nsIX509::getRawDER method was\ncalled. If a victim visited a carefully crafted web page, it was possible\nto execute arbitrary code as the user running Firefox. (CVE-2006-2788)\n\nUsers of Firefox are advised to upgrade to this update, which contains\nFirefox version 1.5.0.5 that corrects these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2006:0610", "url": "https://access.redhat.com/errata/RHSA-2006:0610" }, { "category": "external", "summary": "http://www.redhat.com/security/updates/classification/#critical", "url": "http://www.redhat.com/security/updates/classification/#critical" }, { "category": "external", "summary": "193895", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=193895" }, { "category": "external", "summary": "196973", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=196973" }, { "category": "external", "summary": "200168", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=200168" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2006/rhsa-2006_0610.json" } ], "title": "Red Hat Security Advisory: firefox security update", "tracking": { "current_release_date": "2024-11-22T00:27:20+00:00", "generator": { "date": "2024-11-22T00:27:20+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2006:0610", "initial_release_date": "2006-07-28T23:22:00+00:00", "revision_history": [ { "date": "2006-07-28T23:22:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2006-07-28T00:00:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T00:27:20+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 4", "product": { "name": "Red Hat Enterprise Linux AS version 4", "product_id": "4AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::as" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop version 4", "product": { "name": "Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 4", "product": { "name": "Red Hat Enterprise Linux ES version 4", "product_id": "4ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 4", "product": { "name": "Red Hat Enterprise Linux WS version 4", "product_id": "4WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::ws" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "firefox-0:1.5.0.5-0.el4.1.ia64", "product": { "name": "firefox-0:1.5.0.5-0.el4.1.ia64", "product_id": "firefox-0:1.5.0.5-0.el4.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox@1.5.0.5-0.el4.1?arch=ia64" } } }, { "category": "product_version", "name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "product": { "name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "product_id": "firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox-debuginfo@1.5.0.5-0.el4.1?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "firefox-0:1.5.0.5-0.el4.1.src", "product": { "name": "firefox-0:1.5.0.5-0.el4.1.src", "product_id": "firefox-0:1.5.0.5-0.el4.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox@1.5.0.5-0.el4.1?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "firefox-0:1.5.0.5-0.el4.1.x86_64", "product": { "name": "firefox-0:1.5.0.5-0.el4.1.x86_64", "product_id": "firefox-0:1.5.0.5-0.el4.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox@1.5.0.5-0.el4.1?arch=x86_64" } } }, { "category": "product_version", "name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "product": { "name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "product_id": "firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox-debuginfo@1.5.0.5-0.el4.1?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "firefox-0:1.5.0.5-0.el4.1.i386", "product": { "name": "firefox-0:1.5.0.5-0.el4.1.i386", "product_id": "firefox-0:1.5.0.5-0.el4.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox@1.5.0.5-0.el4.1?arch=i386" } } }, { "category": "product_version", "name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "product": { "name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "product_id": "firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox-debuginfo@1.5.0.5-0.el4.1?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "firefox-0:1.5.0.5-0.el4.1.ppc", "product": { "name": "firefox-0:1.5.0.5-0.el4.1.ppc", "product_id": "firefox-0:1.5.0.5-0.el4.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox@1.5.0.5-0.el4.1?arch=ppc" } } }, { "category": "product_version", "name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "product": { "name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "product_id": "firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox-debuginfo@1.5.0.5-0.el4.1?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "firefox-0:1.5.0.5-0.el4.1.s390x", "product": { "name": "firefox-0:1.5.0.5-0.el4.1.s390x", "product_id": "firefox-0:1.5.0.5-0.el4.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox@1.5.0.5-0.el4.1?arch=s390x" } } }, { "category": "product_version", "name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "product": { "name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "product_id": "firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox-debuginfo@1.5.0.5-0.el4.1?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "firefox-0:1.5.0.5-0.el4.1.s390", "product": { "name": "firefox-0:1.5.0.5-0.el4.1.s390", "product_id": "firefox-0:1.5.0.5-0.el4.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox@1.5.0.5-0.el4.1?arch=s390" } } }, { "category": "product_version", "name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "product": { "name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "product_id": "firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox-debuginfo@1.5.0.5-0.el4.1?arch=s390" } } } ], "category": "architecture", "name": "s390" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.5-0.el4.1.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:firefox-0:1.5.0.5-0.el4.1.i386" }, "product_reference": "firefox-0:1.5.0.5-0.el4.1.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.5-0.el4.1.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:firefox-0:1.5.0.5-0.el4.1.ia64" }, "product_reference": "firefox-0:1.5.0.5-0.el4.1.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.5-0.el4.1.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:firefox-0:1.5.0.5-0.el4.1.ppc" }, "product_reference": "firefox-0:1.5.0.5-0.el4.1.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.5-0.el4.1.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:firefox-0:1.5.0.5-0.el4.1.s390" }, "product_reference": "firefox-0:1.5.0.5-0.el4.1.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.5-0.el4.1.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:firefox-0:1.5.0.5-0.el4.1.s390x" }, "product_reference": "firefox-0:1.5.0.5-0.el4.1.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.5-0.el4.1.src as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:firefox-0:1.5.0.5-0.el4.1.src" }, "product_reference": "firefox-0:1.5.0.5-0.el4.1.src", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.5-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:firefox-0:1.5.0.5-0.el4.1.x86_64" }, "product_reference": "firefox-0:1.5.0.5-0.el4.1.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386" }, "product_reference": "firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64" }, "product_reference": "firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc" }, "product_reference": "firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390" }, "product_reference": "firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x" }, "product_reference": "firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64" }, "product_reference": "firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.5-0.el4.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:firefox-0:1.5.0.5-0.el4.1.i386" }, "product_reference": "firefox-0:1.5.0.5-0.el4.1.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.5-0.el4.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64" }, "product_reference": "firefox-0:1.5.0.5-0.el4.1.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.5-0.el4.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc" }, "product_reference": "firefox-0:1.5.0.5-0.el4.1.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.5-0.el4.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390" }, "product_reference": "firefox-0:1.5.0.5-0.el4.1.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.5-0.el4.1.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x" }, "product_reference": "firefox-0:1.5.0.5-0.el4.1.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.5-0.el4.1.src as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:firefox-0:1.5.0.5-0.el4.1.src" }, "product_reference": "firefox-0:1.5.0.5-0.el4.1.src", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.5-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64" }, "product_reference": "firefox-0:1.5.0.5-0.el4.1.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386" }, "product_reference": "firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64" }, "product_reference": "firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc" }, "product_reference": "firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390" }, "product_reference": "firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x" }, "product_reference": "firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64" }, "product_reference": "firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.5-0.el4.1.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:firefox-0:1.5.0.5-0.el4.1.i386" }, "product_reference": "firefox-0:1.5.0.5-0.el4.1.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.5-0.el4.1.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:firefox-0:1.5.0.5-0.el4.1.ia64" }, "product_reference": "firefox-0:1.5.0.5-0.el4.1.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.5-0.el4.1.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:firefox-0:1.5.0.5-0.el4.1.ppc" }, "product_reference": "firefox-0:1.5.0.5-0.el4.1.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.5-0.el4.1.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:firefox-0:1.5.0.5-0.el4.1.s390" }, "product_reference": "firefox-0:1.5.0.5-0.el4.1.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.5-0.el4.1.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:firefox-0:1.5.0.5-0.el4.1.s390x" }, "product_reference": "firefox-0:1.5.0.5-0.el4.1.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.5-0.el4.1.src as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:firefox-0:1.5.0.5-0.el4.1.src" }, "product_reference": "firefox-0:1.5.0.5-0.el4.1.src", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.5-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:firefox-0:1.5.0.5-0.el4.1.x86_64" }, "product_reference": "firefox-0:1.5.0.5-0.el4.1.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386" }, "product_reference": "firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64" }, "product_reference": "firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc" }, "product_reference": "firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390" }, "product_reference": "firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x" }, "product_reference": "firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64" }, "product_reference": "firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.5-0.el4.1.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:firefox-0:1.5.0.5-0.el4.1.i386" }, "product_reference": "firefox-0:1.5.0.5-0.el4.1.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.5-0.el4.1.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:firefox-0:1.5.0.5-0.el4.1.ia64" }, "product_reference": "firefox-0:1.5.0.5-0.el4.1.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.5-0.el4.1.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:firefox-0:1.5.0.5-0.el4.1.ppc" }, "product_reference": "firefox-0:1.5.0.5-0.el4.1.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.5-0.el4.1.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:firefox-0:1.5.0.5-0.el4.1.s390" }, "product_reference": "firefox-0:1.5.0.5-0.el4.1.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.5-0.el4.1.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:firefox-0:1.5.0.5-0.el4.1.s390x" }, "product_reference": "firefox-0:1.5.0.5-0.el4.1.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.5-0.el4.1.src as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:firefox-0:1.5.0.5-0.el4.1.src" }, "product_reference": "firefox-0:1.5.0.5-0.el4.1.src", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.5-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:firefox-0:1.5.0.5-0.el4.1.x86_64" }, "product_reference": "firefox-0:1.5.0.5-0.el4.1.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386" }, "product_reference": "firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64" }, "product_reference": "firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc" }, "product_reference": "firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390" }, "product_reference": "firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x" }, "product_reference": "firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64" }, "product_reference": "firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "relates_to_product_reference": "4WS" } ] }, "vulnerabilities": [ { "cve": "CVE-2006-2776", "discovery_date": "2006-05-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618112" } ], "notes": [ { "category": "description", "text": "Certain privileged UI code in Mozilla Firefox and Thunderbird before 1.5.0.4 calls content-defined setters on an object prototype, which allows remote attackers to execute code at a higher privilege than intended.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:firefox-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-0:1.5.0.5-0.el4.1.src", "4AS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-0:1.5.0.5-0.el4.1.src", "4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-0:1.5.0.5-0.el4.1.src", "4ES:firefox-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-0:1.5.0.5-0.el4.1.src", "4WS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2776" }, { "category": "external", "summary": "RHBZ#1618112", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618112" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2776", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2776" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2776", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2776" } ], "release_date": "2006-06-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-28T23:22:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:firefox-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-0:1.5.0.5-0.el4.1.src", "4AS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-0:1.5.0.5-0.el4.1.src", "4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-0:1.5.0.5-0.el4.1.src", "4ES:firefox-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-0:1.5.0.5-0.el4.1.src", "4WS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0610" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2006-2778", "discovery_date": "2006-05-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618113" } ], "notes": [ { "category": "description", "text": "The crypto.signText function in Mozilla Firefox and Thunderbird before 1.5.0.4 allows remote attackers to execute arbitrary code via certain optional Certificate Authority name arguments, which causes an invalid array index and triggers a buffer overflow.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:firefox-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-0:1.5.0.5-0.el4.1.src", "4AS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-0:1.5.0.5-0.el4.1.src", "4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-0:1.5.0.5-0.el4.1.src", "4ES:firefox-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-0:1.5.0.5-0.el4.1.src", "4WS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2778" }, { "category": "external", "summary": "RHBZ#1618113", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618113" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2778", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2778" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2778", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2778" } ], "release_date": "2006-06-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-28T23:22:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:firefox-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-0:1.5.0.5-0.el4.1.src", "4AS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-0:1.5.0.5-0.el4.1.src", "4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-0:1.5.0.5-0.el4.1.src", "4ES:firefox-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-0:1.5.0.5-0.el4.1.src", "4WS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0610" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2006-2779", "discovery_date": "2006-06-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618114" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox and Thunderbird before 1.5.0.4 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via (1) nested \u003coption\u003e tags in a select tag, (2) a DOMNodeRemoved mutation event, (3) \"Content-implemented tree views,\" (4) BoxObjects, (5) the XBL implementation, (6) an iframe that attempts to remove itself, which leads to memory corruption.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:firefox-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-0:1.5.0.5-0.el4.1.src", "4AS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-0:1.5.0.5-0.el4.1.src", "4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-0:1.5.0.5-0.el4.1.src", "4ES:firefox-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-0:1.5.0.5-0.el4.1.src", "4WS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2779" }, { "category": "external", "summary": "RHBZ#1618114", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618114" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2779", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2779" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2779", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2779" } ], "release_date": "2006-06-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-28T23:22:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:firefox-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-0:1.5.0.5-0.el4.1.src", "4AS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-0:1.5.0.5-0.el4.1.src", "4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-0:1.5.0.5-0.el4.1.src", "4ES:firefox-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-0:1.5.0.5-0.el4.1.src", "4WS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0610" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-2780", "discovery_date": "2006-06-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618115" } ], "notes": [ { "category": "description", "text": "Integer overflow in Mozilla Firefox and Thunderbird before 1.5.0.4 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via \"jsstr tagify,\" which leads to memory corruption.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:firefox-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-0:1.5.0.5-0.el4.1.src", "4AS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-0:1.5.0.5-0.el4.1.src", "4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-0:1.5.0.5-0.el4.1.src", "4ES:firefox-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-0:1.5.0.5-0.el4.1.src", "4WS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2780" }, { "category": "external", "summary": "RHBZ#1618115", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618115" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2780", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2780" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2780", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2780" } ], "release_date": "2006-06-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-28T23:22:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:firefox-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-0:1.5.0.5-0.el4.1.src", "4AS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-0:1.5.0.5-0.el4.1.src", "4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-0:1.5.0.5-0.el4.1.src", "4ES:firefox-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-0:1.5.0.5-0.el4.1.src", "4WS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0610" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-2782", "discovery_date": "2006-05-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618116" } ], "notes": [ { "category": "description", "text": "Firefox 1.5.0.2 does not fix all test cases associated with CVE-2006-1729, which allows remote attackers to read arbitrary files by inserting the target filename into a text box, then turning that box into a file upload control.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:firefox-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-0:1.5.0.5-0.el4.1.src", "4AS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-0:1.5.0.5-0.el4.1.src", "4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-0:1.5.0.5-0.el4.1.src", "4ES:firefox-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-0:1.5.0.5-0.el4.1.src", "4WS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2782" }, { "category": "external", "summary": "RHBZ#1618116", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618116" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2782", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2782" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2782", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2782" } ], "release_date": "2006-06-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-28T23:22:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:firefox-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-0:1.5.0.5-0.el4.1.src", "4AS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-0:1.5.0.5-0.el4.1.src", "4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-0:1.5.0.5-0.el4.1.src", "4ES:firefox-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-0:1.5.0.5-0.el4.1.src", "4WS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0610" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2006-2783", "discovery_date": "2006-05-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618117" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox and Thunderbird before 1.5.0.4 strip the Unicode Byte-order-Mark (BOM) from a UTF-8 page before the page is passed to the parser, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a BOM sequence in the middle of a dangerous tag such as SCRIPT.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:firefox-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-0:1.5.0.5-0.el4.1.src", "4AS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-0:1.5.0.5-0.el4.1.src", "4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-0:1.5.0.5-0.el4.1.src", "4ES:firefox-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-0:1.5.0.5-0.el4.1.src", "4WS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2783" }, { "category": "external", "summary": "RHBZ#1618117", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618117" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2783", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2783" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2783", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2783" } ], "release_date": "2006-06-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-28T23:22:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:firefox-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-0:1.5.0.5-0.el4.1.src", "4AS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-0:1.5.0.5-0.el4.1.src", "4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-0:1.5.0.5-0.el4.1.src", "4ES:firefox-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-0:1.5.0.5-0.el4.1.src", "4WS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0610" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2006-2784", "discovery_date": "2006-05-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618118" } ], "notes": [ { "category": "description", "text": "The PLUGINSPAGE functionality in Mozilla Firefox before 1.5.0.4 allows remote user-assisted attackers to execute privileged code by tricking a user into installing missing plugins and selecting the \"Manual Install\" button, then using nested javascript: URLs. NOTE: the manual install button is used for downloading software from a remote web site, so this issue would not cross privilege boundaries if the user progresses to the point of installing malicious software from the attacker-controlled site.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:firefox-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-0:1.5.0.5-0.el4.1.src", "4AS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-0:1.5.0.5-0.el4.1.src", "4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-0:1.5.0.5-0.el4.1.src", "4ES:firefox-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-0:1.5.0.5-0.el4.1.src", "4WS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2784" }, { "category": "external", "summary": "RHBZ#1618118", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618118" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2784", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2784" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2784", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2784" } ], "release_date": "2006-06-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-28T23:22:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:firefox-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-0:1.5.0.5-0.el4.1.src", "4AS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-0:1.5.0.5-0.el4.1.src", "4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-0:1.5.0.5-0.el4.1.src", "4ES:firefox-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-0:1.5.0.5-0.el4.1.src", "4WS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0610" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2006-2785", "discovery_date": "2006-05-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618119" } ], "notes": [ { "category": "description", "text": "Cross-site scripting (XSS) vulnerability in Mozilla Firefox before 1.5.0.4 allows user-assisted remote attackers to inject arbitrary web script or HTML by tricking a user into (1) performing a \"View Image\" on a broken image in which the SRC attribute contains a Javascript URL, or (2) selecting \"Show only this frame\" on a frame whose SRC attribute contains a Javascript URL.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:firefox-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-0:1.5.0.5-0.el4.1.src", "4AS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-0:1.5.0.5-0.el4.1.src", "4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-0:1.5.0.5-0.el4.1.src", "4ES:firefox-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-0:1.5.0.5-0.el4.1.src", "4WS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2785" }, { "category": "external", "summary": "RHBZ#1618119", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618119" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2785", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2785" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2785", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2785" } ], "release_date": "2006-06-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-28T23:22:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:firefox-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-0:1.5.0.5-0.el4.1.src", "4AS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-0:1.5.0.5-0.el4.1.src", "4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-0:1.5.0.5-0.el4.1.src", "4ES:firefox-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-0:1.5.0.5-0.el4.1.src", "4WS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0610" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2006-2786", "discovery_date": "2006-05-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618120" } ], "notes": [ { "category": "description", "text": "HTTP response smuggling vulnerability in Mozilla Firefox and Thunderbird before 1.5.0.4, when used with certain proxy servers, allows remote attackers to cause Firefox to interpret certain responses as if they were responses from two different sites via (1) invalid HTTP response headers with spaces between the header name and the colon, which might not be ignored in some cases, or (2) HTTP 1.1 headers through an HTTP 1.0 proxy, which are ignored by the proxy but processed by the client.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:firefox-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-0:1.5.0.5-0.el4.1.src", "4AS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-0:1.5.0.5-0.el4.1.src", "4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-0:1.5.0.5-0.el4.1.src", "4ES:firefox-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-0:1.5.0.5-0.el4.1.src", "4WS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2786" }, { "category": "external", "summary": "RHBZ#1618120", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618120" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2786", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2786" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2786", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2786" } ], "release_date": "2006-06-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-28T23:22:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:firefox-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-0:1.5.0.5-0.el4.1.src", "4AS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-0:1.5.0.5-0.el4.1.src", "4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-0:1.5.0.5-0.el4.1.src", "4ES:firefox-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-0:1.5.0.5-0.el4.1.src", "4WS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0610" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2006-2787", "discovery_date": "2006-05-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618121" } ], "notes": [ { "category": "description", "text": "EvalInSandbox in Mozilla Firefox and Thunderbird before 1.5.0.4 allows remote attackers to gain privileges via javascript that calls the valueOf method on objects that were created outside of the sandbox.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:firefox-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-0:1.5.0.5-0.el4.1.src", "4AS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-0:1.5.0.5-0.el4.1.src", "4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-0:1.5.0.5-0.el4.1.src", "4ES:firefox-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-0:1.5.0.5-0.el4.1.src", "4WS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2787" }, { "category": "external", "summary": "RHBZ#1618121", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618121" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2787", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2787" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2787", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2787" } ], "release_date": "2006-06-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-28T23:22:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:firefox-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-0:1.5.0.5-0.el4.1.src", "4AS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-0:1.5.0.5-0.el4.1.src", "4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-0:1.5.0.5-0.el4.1.src", "4ES:firefox-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-0:1.5.0.5-0.el4.1.src", "4WS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0610" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2006-2788", "discovery_date": "2006-05-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618122" } ], "notes": [ { "category": "description", "text": "Double free vulnerability in the getRawDER function for nsIX509Cert in Firefox allows remote attackers to cause a denial of service (hang) and possibly execute arbitrary code via certain Javascript code.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:firefox-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-0:1.5.0.5-0.el4.1.src", "4AS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-0:1.5.0.5-0.el4.1.src", "4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-0:1.5.0.5-0.el4.1.src", "4ES:firefox-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-0:1.5.0.5-0.el4.1.src", "4WS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2788" }, { "category": "external", "summary": "RHBZ#1618122", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618122" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2788", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2788" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2788", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2788" } ], "release_date": "2006-06-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-28T23:22:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:firefox-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-0:1.5.0.5-0.el4.1.src", "4AS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-0:1.5.0.5-0.el4.1.src", "4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-0:1.5.0.5-0.el4.1.src", "4ES:firefox-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-0:1.5.0.5-0.el4.1.src", "4WS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0610" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2006-3113", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618135" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox 1.5 before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via simultaneous XPCOM events, which causes a timer object to be deleted in a way that triggers memory corruption.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:firefox-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-0:1.5.0.5-0.el4.1.src", "4AS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-0:1.5.0.5-0.el4.1.src", "4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-0:1.5.0.5-0.el4.1.src", "4ES:firefox-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-0:1.5.0.5-0.el4.1.src", "4WS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3113" }, { "category": "external", "summary": "RHBZ#1618135", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618135" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3113", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3113" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3113", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3113" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-28T23:22:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:firefox-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-0:1.5.0.5-0.el4.1.src", "4AS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-0:1.5.0.5-0.el4.1.src", "4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-0:1.5.0.5-0.el4.1.src", "4ES:firefox-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-0:1.5.0.5-0.el4.1.src", "4WS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0610" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-3677", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618153" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox 1.5 before 1.5.0.5 and SeaMonkey before 1.0.3 allows remote attackers to execute arbitrary code by changing certain properties of the window navigator object (window.navigator) that are accessed when Java starts up, which causes a crash that leads to code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:firefox-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-0:1.5.0.5-0.el4.1.src", "4AS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-0:1.5.0.5-0.el4.1.src", "4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-0:1.5.0.5-0.el4.1.src", "4ES:firefox-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-0:1.5.0.5-0.el4.1.src", "4WS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3677" }, { "category": "external", "summary": "RHBZ#1618153", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618153" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3677", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3677" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3677", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3677" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-28T23:22:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:firefox-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-0:1.5.0.5-0.el4.1.src", "4AS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-0:1.5.0.5-0.el4.1.src", "4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-0:1.5.0.5-0.el4.1.src", "4ES:firefox-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-0:1.5.0.5-0.el4.1.src", "4WS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0610" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-3801", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618161" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox 1.5 before 1.5.0.5 and SeaMonkey before 1.0.3 does not properly clear a JavaScript reference to a frame or window, which leaves a pointer to a deleted object that allows remote attackers to execute arbitrary native code.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:firefox-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-0:1.5.0.5-0.el4.1.src", "4AS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-0:1.5.0.5-0.el4.1.src", "4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-0:1.5.0.5-0.el4.1.src", "4ES:firefox-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-0:1.5.0.5-0.el4.1.src", "4WS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3801" }, { "category": "external", "summary": "RHBZ#1618161", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618161" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3801", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3801" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3801", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3801" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-28T23:22:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:firefox-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-0:1.5.0.5-0.el4.1.src", "4AS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-0:1.5.0.5-0.el4.1.src", "4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-0:1.5.0.5-0.el4.1.src", "4ES:firefox-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-0:1.5.0.5-0.el4.1.src", "4WS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0610" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-3802", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618162" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to hijack native DOM methods from objects in another domain and conduct cross-site scripting (XSS) attacks using DOM methods of the top-level object.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:firefox-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-0:1.5.0.5-0.el4.1.src", "4AS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-0:1.5.0.5-0.el4.1.src", "4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-0:1.5.0.5-0.el4.1.src", "4ES:firefox-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-0:1.5.0.5-0.el4.1.src", "4WS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3802" }, { "category": "external", "summary": "RHBZ#1618162", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618162" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3802", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3802" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3802", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3802" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-28T23:22:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:firefox-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-0:1.5.0.5-0.el4.1.src", "4AS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-0:1.5.0.5-0.el4.1.src", "4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-0:1.5.0.5-0.el4.1.src", "4ES:firefox-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-0:1.5.0.5-0.el4.1.src", "4WS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0610" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2006-3803", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618163" } ], "notes": [ { "category": "description", "text": "Race condition in the JavaScript garbage collection in Mozilla Firefox 1.5 before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 might allow remote attackers to execute arbitrary code by causing the garbage collector to delete a temporary variable while it is still being used during the creation of a new Function object.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:firefox-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-0:1.5.0.5-0.el4.1.src", "4AS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-0:1.5.0.5-0.el4.1.src", "4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-0:1.5.0.5-0.el4.1.src", "4ES:firefox-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-0:1.5.0.5-0.el4.1.src", "4WS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3803" }, { "category": "external", "summary": "RHBZ#1618163", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618163" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3803", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3803" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3803", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3803" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-28T23:22:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:firefox-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-0:1.5.0.5-0.el4.1.src", "4AS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-0:1.5.0.5-0.el4.1.src", "4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-0:1.5.0.5-0.el4.1.src", "4ES:firefox-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-0:1.5.0.5-0.el4.1.src", "4WS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0610" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-3805", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618165" } ], "notes": [ { "category": "description", "text": "The Javascript engine in Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 might allow remote attackers to execute arbitrary code via vectors involving garbage collection that causes deletion of a temporary object that is still being used.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:firefox-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-0:1.5.0.5-0.el4.1.src", "4AS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-0:1.5.0.5-0.el4.1.src", "4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-0:1.5.0.5-0.el4.1.src", "4ES:firefox-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-0:1.5.0.5-0.el4.1.src", "4WS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3805" }, { "category": "external", "summary": "RHBZ#1618165", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618165" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3805", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3805" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3805", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3805" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-28T23:22:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:firefox-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-0:1.5.0.5-0.el4.1.src", "4AS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-0:1.5.0.5-0.el4.1.src", "4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-0:1.5.0.5-0.el4.1.src", "4ES:firefox-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-0:1.5.0.5-0.el4.1.src", "4WS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0610" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-3806", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618166" } ], "notes": [ { "category": "description", "text": "Multiple integer overflows in the Javascript engine in Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 might allow remote attackers to execute arbitrary code via vectors involving (1) long strings in the toSource method of the Object, Array, and String objects; and (2) unspecified \"string function arguments.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:firefox-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-0:1.5.0.5-0.el4.1.src", "4AS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-0:1.5.0.5-0.el4.1.src", "4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-0:1.5.0.5-0.el4.1.src", "4ES:firefox-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-0:1.5.0.5-0.el4.1.src", "4WS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3806" }, { "category": "external", "summary": "RHBZ#1618166", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618166" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3806", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3806" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3806", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3806" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-28T23:22:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:firefox-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-0:1.5.0.5-0.el4.1.src", "4AS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-0:1.5.0.5-0.el4.1.src", "4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-0:1.5.0.5-0.el4.1.src", "4ES:firefox-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-0:1.5.0.5-0.el4.1.src", "4WS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0610" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-3807", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618167" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to execute arbitrary code via script that changes the standard Object() constructor to return a reference to a privileged object and calling \"named JavaScript functions\" that use the constructor.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:firefox-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-0:1.5.0.5-0.el4.1.src", "4AS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-0:1.5.0.5-0.el4.1.src", "4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-0:1.5.0.5-0.el4.1.src", "4ES:firefox-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-0:1.5.0.5-0.el4.1.src", "4WS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3807" }, { "category": "external", "summary": "RHBZ#1618167", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618167" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3807", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3807" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3807", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3807" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-28T23:22:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:firefox-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-0:1.5.0.5-0.el4.1.src", "4AS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-0:1.5.0.5-0.el4.1.src", "4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-0:1.5.0.5-0.el4.1.src", "4ES:firefox-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-0:1.5.0.5-0.el4.1.src", "4WS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0610" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-3808", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618168" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox before 1.5.0.5 and SeaMonkey before 1.0.3 allows remote Proxy AutoConfig (PAC) servers to execute code with elevated privileges via a PAC script that sets the FindProxyForURL function to an eval method on a privileged object.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:firefox-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-0:1.5.0.5-0.el4.1.src", "4AS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-0:1.5.0.5-0.el4.1.src", "4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-0:1.5.0.5-0.el4.1.src", "4ES:firefox-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-0:1.5.0.5-0.el4.1.src", "4WS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3808" }, { "category": "external", "summary": "RHBZ#1618168", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618168" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3808", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3808" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3808", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3808" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-28T23:22:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:firefox-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-0:1.5.0.5-0.el4.1.src", "4AS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-0:1.5.0.5-0.el4.1.src", "4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-0:1.5.0.5-0.el4.1.src", "4ES:firefox-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-0:1.5.0.5-0.el4.1.src", "4WS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0610" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2006-3809", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618169" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows scripts with the UniversalBrowserRead privilege to gain UniversalXPConnect privileges and possibly execute code or obtain sensitive data by reading into a privileged context.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:firefox-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-0:1.5.0.5-0.el4.1.src", "4AS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-0:1.5.0.5-0.el4.1.src", "4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-0:1.5.0.5-0.el4.1.src", "4ES:firefox-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-0:1.5.0.5-0.el4.1.src", "4WS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3809" }, { "category": "external", "summary": "RHBZ#1618169", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618169" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3809", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3809" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3809", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3809" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-28T23:22:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:firefox-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-0:1.5.0.5-0.el4.1.src", "4AS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-0:1.5.0.5-0.el4.1.src", "4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-0:1.5.0.5-0.el4.1.src", "4ES:firefox-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-0:1.5.0.5-0.el4.1.src", "4WS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0610" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-3810", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618170" } ], "notes": [ { "category": "description", "text": "Cross-site scripting (XSS) vulnerability in Mozilla Firefox 1.5 before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to inject arbitrary web script or HTML via the XPCNativeWrapper(window).Function construct.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:firefox-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-0:1.5.0.5-0.el4.1.src", "4AS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-0:1.5.0.5-0.el4.1.src", "4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-0:1.5.0.5-0.el4.1.src", "4ES:firefox-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-0:1.5.0.5-0.el4.1.src", "4WS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3810" }, { "category": "external", "summary": "RHBZ#1618170", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618170" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3810", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3810" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3810", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3810" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-28T23:22:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:firefox-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-0:1.5.0.5-0.el4.1.src", "4AS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-0:1.5.0.5-0.el4.1.src", "4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-0:1.5.0.5-0.el4.1.src", "4ES:firefox-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-0:1.5.0.5-0.el4.1.src", "4WS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0610" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2006-3811", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618171" } ], "notes": [ { "category": "description", "text": "Multiple vulnerabilities in Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via Javascript that leads to memory corruption, including (1) nsListControlFrame::FireMenuItemActiveEvent, (2) buffer overflows in the string class in out-of-memory conditions, (3) table row and column groups, (4) \"anonymous box selectors outside of UA stylesheets,\" (5) stale references to \"removed nodes,\" and (6) running the crypto.generateCRMFRequest callback on deleted context.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:firefox-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-0:1.5.0.5-0.el4.1.src", "4AS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-0:1.5.0.5-0.el4.1.src", "4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-0:1.5.0.5-0.el4.1.src", "4ES:firefox-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-0:1.5.0.5-0.el4.1.src", "4WS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3811" }, { "category": "external", "summary": "RHBZ#1618171", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618171" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3811", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3811" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3811", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3811" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-28T23:22:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:firefox-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-0:1.5.0.5-0.el4.1.src", "4AS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-0:1.5.0.5-0.el4.1.src", "4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-0:1.5.0.5-0.el4.1.src", "4ES:firefox-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-0:1.5.0.5-0.el4.1.src", "4WS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0610" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-3812", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "200455" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to reference remote files and possibly load chrome: URLs by tricking the user into copying or dragging links.", "title": "Vulnerability description" }, { "category": "summary", "text": "vulnerabilities: CVE-2006-{3113,3677,3801-3812}", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:firefox-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-0:1.5.0.5-0.el4.1.src", "4AS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-0:1.5.0.5-0.el4.1.src", "4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-0:1.5.0.5-0.el4.1.src", "4ES:firefox-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-0:1.5.0.5-0.el4.1.src", "4WS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3812" }, { "category": "external", "summary": "RHBZ#200455", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=200455" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3812", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3812" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3812", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3812" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-28T23:22:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:firefox-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-0:1.5.0.5-0.el4.1.src", "4AS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-0:1.5.0.5-0.el4.1.src", "4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-0:1.5.0.5-0.el4.1.src", "4ES:firefox-0:1.5.0.5-0.el4.1.x86_64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-0:1.5.0.5-0.el4.1.src", "4WS:firefox-0:1.5.0.5-0.el4.1.x86_64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x", "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0610" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "vulnerabilities: CVE-2006-{3113,3677,3801-3812}" } ] }
rhsa-2006_0609
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated seamonkey packages that fix several security bugs in the mozilla\npackage are now available for Red Hat Enterprise Linux 4.\n\nThis update has been rated as having critical security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "Seamonkey is an open source Web browser, advanced email and newsgroup\nclient, IRC chat client, and HTML editor.\n\nThe Mozilla Foundation has discontinued support for the Mozilla Suite. This\nupdate deprecates the Mozilla Suite in Red Hat Enterprise Linux 4 in\nfavor of the supported Seamonkey Suite.\n\nThis update also resolves a number of outstanding Mozilla security issues:\n\nSeveral flaws were found in the way Seamonkey processed certain javascript\nactions. A malicious web page could execute arbitrary javascript\ninstructions with the permissions of \"chrome\", allowing the page to steal\nsensitive information or install browser malware. (CVE-2006-2776,\nCVE-2006-2784, CVE-2006-2785, CVE-2006-2787, CVE-2006-3807, CVE-2006-3809,\nCVE-2006-3812)\n\nSeveral denial of service flaws were found in the way Seamonkey processed\ncertain web content. A malicious web page could crash the browser or\npossibly execute arbitrary code as the user running Seamonkey.\n(CVE-2006-2779, CVE-2006-2780, CVE-2006-3801, CVE-2006-3677, CVE-2006-3113,\nCVE-2006-3803, CVE-2006-3805, CVE-2006-3806, CVE-2006-3811)\n\nTwo flaws were found in the way Seamonkey-mail displayed malformed\ninline vcard attachments. If a victim viewed an email message containing\na carefully crafted vcard it was possible to execute arbitrary code as the\nuser running Mozilla-mail. (CVE-2006-2781, CVE-2006-3804)\n\nA cross-site scripting flaw was found in the way Seamonkey processed\nUnicode Byte-Order-Mark (BOM) markers in UTF-8 web pages. A malicious web\npage could execute a script within the browser that a web input sanitizer\ncould miss due to a malformed \"script\" tag. (CVE-2006-2783)\n\nSeveral flaws were found in the way Seamonkey processed certain javascript\nactions. A malicious web page could conduct a cross-site scripting attack\nor steal sensitive information (such as cookies owned by other domains).\n(CVE-2006-3802, CVE-2006-3810)\n\nA form file upload flaw was found in the way Seamonkey handled javascript\ninput object mutation. A malicious web page could upload an arbitrary local\nfile at form submission time without user interaction. (CVE-2006-2782)\n\nA denial of service flaw was found in the way Seamonkey called the\ncrypto.signText() javascript function. A malicious web page could crash the\nbrowser if the victim had a client certificate loaded. (CVE-2006-2778)\n\nTwo HTTP response smuggling flaws were found in the way Seamonkey processed\ncertain invalid HTTP response headers. A malicious web site could return\nspecially crafted HTTP response headers which may bypass HTTP proxy\nrestrictions. (CVE-2006-2786)\n\nA flaw was found in the way Seamonkey processed Proxy AutoConfig scripts. A\nmalicious Proxy AutoConfig server could execute arbitrary javascript\ninstructions with the permissions of \"chrome\", allowing the page to steal\nsensitive information or install browser malware. (CVE-2006-3808)\n\nA double free flaw was found in the way the nsIX509::getRawDER method was\ncalled. If a victim visited a carefully crafted web page, it was possible\nto execute arbitrary code as the user running Mozilla. (CVE-2006-2788)\n\nUsers of Mozilla are advised to upgrade to this update, which contains\nSeamonkey version 1.0.3 that corrects these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2006:0609", "url": "https://access.redhat.com/errata/RHSA-2006:0609" }, { "category": "external", "summary": "http://www.redhat.com/security/updates/classification/#critical", "url": "http://www.redhat.com/security/updates/classification/#critical" }, { "category": "external", "summary": "193906", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=193906" }, { "category": "external", "summary": "196969", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=196969" }, { "category": "external", "summary": "200161", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=200161" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2006/rhsa-2006_0609.json" } ], "title": "Red Hat Security Advisory: seamonkey security update", "tracking": { "current_release_date": "2024-11-22T00:27:15+00:00", "generator": { "date": "2024-11-22T00:27:15+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2006:0609", "initial_release_date": "2006-08-02T18:39:00+00:00", "revision_history": [ { "date": "2006-08-02T18:39:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2006-08-02T00:00:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T00:27:15+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 4", "product": { "name": "Red Hat Enterprise Linux AS version 4", "product_id": "4AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::as" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop version 4", "product": { "name": "Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 4", "product": { "name": "Red Hat Enterprise Linux ES version 4", "product_id": "4ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 4", "product": { "name": "Red Hat Enterprise Linux WS version 4", "product_id": "4WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::ws" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "seamonkey-mail-0:1.0.3-0.el4.1.ia64", "product": { "name": "seamonkey-mail-0:1.0.3-0.el4.1.ia64", "product_id": "seamonkey-mail-0:1.0.3-0.el4.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-mail@1.0.3-0.el4.1?arch=ia64" } } }, { "category": "product_version", "name": "seamonkey-devel-0:1.0.3-0.el4.1.ia64", "product": { "name": "seamonkey-devel-0:1.0.3-0.el4.1.ia64", "product_id": "seamonkey-devel-0:1.0.3-0.el4.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-devel@1.0.3-0.el4.1?arch=ia64" } } }, { "category": "product_version", "name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "product": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "product_id": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-dom-inspector@1.0.3-0.el4.1?arch=ia64" } } }, { "category": "product_version", "name": "seamonkey-0:1.0.3-0.el4.1.ia64", "product": { "name": "seamonkey-0:1.0.3-0.el4.1.ia64", "product_id": "seamonkey-0:1.0.3-0.el4.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey@1.0.3-0.el4.1?arch=ia64" } } }, { "category": "product_version", "name": "seamonkey-chat-0:1.0.3-0.el4.1.ia64", "product": { "name": "seamonkey-chat-0:1.0.3-0.el4.1.ia64", "product_id": "seamonkey-chat-0:1.0.3-0.el4.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-chat@1.0.3-0.el4.1?arch=ia64" } } }, { "category": "product_version", "name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "product": { "name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "product_id": "seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-debuginfo@1.0.3-0.el4.1?arch=ia64" } } }, { "category": "product_version", "name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "product": { "name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "product_id": "seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-js-debugger@1.0.3-0.el4.1?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "product": { "name": "seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "product_id": "seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-mail@1.0.3-0.el4.1?arch=x86_64" } } }, { "category": "product_version", "name": "seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "product": { "name": "seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "product_id": "seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-devel@1.0.3-0.el4.1?arch=x86_64" } } }, { "category": "product_version", "name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "product": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "product_id": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-dom-inspector@1.0.3-0.el4.1?arch=x86_64" } } }, { "category": "product_version", "name": "seamonkey-0:1.0.3-0.el4.1.x86_64", "product": { "name": "seamonkey-0:1.0.3-0.el4.1.x86_64", "product_id": "seamonkey-0:1.0.3-0.el4.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey@1.0.3-0.el4.1?arch=x86_64" } } }, { "category": "product_version", "name": "seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "product": { "name": "seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "product_id": "seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-chat@1.0.3-0.el4.1?arch=x86_64" } } }, { "category": "product_version", "name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "product": { "name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "product_id": "seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-debuginfo@1.0.3-0.el4.1?arch=x86_64" } } }, { "category": "product_version", "name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "product": { "name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "product_id": "seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-js-debugger@1.0.3-0.el4.1?arch=x86_64" } } }, { "category": "product_version", "name": "devhelp-devel-0:0.10-0.2.el4.x86_64", "product": { "name": "devhelp-devel-0:0.10-0.2.el4.x86_64", "product_id": "devhelp-devel-0:0.10-0.2.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/devhelp-devel@0.10-0.2.el4?arch=x86_64" } } }, { "category": "product_version", "name": "devhelp-0:0.10-0.2.el4.x86_64", "product": { "name": "devhelp-0:0.10-0.2.el4.x86_64", "product_id": "devhelp-0:0.10-0.2.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/devhelp@0.10-0.2.el4?arch=x86_64" } } }, { "category": "product_version", "name": "devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "product": { "name": "devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "product_id": "devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/devhelp-debuginfo@0.10-0.2.el4?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "seamonkey-mail-0:1.0.3-0.el4.1.i386", "product": { "name": "seamonkey-mail-0:1.0.3-0.el4.1.i386", "product_id": "seamonkey-mail-0:1.0.3-0.el4.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-mail@1.0.3-0.el4.1?arch=i386" } } }, { "category": "product_version", "name": "seamonkey-devel-0:1.0.3-0.el4.1.i386", "product": { "name": "seamonkey-devel-0:1.0.3-0.el4.1.i386", "product_id": "seamonkey-devel-0:1.0.3-0.el4.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-devel@1.0.3-0.el4.1?arch=i386" } } }, { "category": "product_version", "name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "product": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "product_id": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-dom-inspector@1.0.3-0.el4.1?arch=i386" } } }, { "category": "product_version", "name": "seamonkey-0:1.0.3-0.el4.1.i386", "product": { "name": "seamonkey-0:1.0.3-0.el4.1.i386", "product_id": "seamonkey-0:1.0.3-0.el4.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey@1.0.3-0.el4.1?arch=i386" } } }, { "category": "product_version", "name": "seamonkey-chat-0:1.0.3-0.el4.1.i386", "product": { "name": "seamonkey-chat-0:1.0.3-0.el4.1.i386", "product_id": "seamonkey-chat-0:1.0.3-0.el4.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-chat@1.0.3-0.el4.1?arch=i386" } } }, { "category": "product_version", "name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "product": { "name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "product_id": "seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-debuginfo@1.0.3-0.el4.1?arch=i386" } } }, { "category": "product_version", "name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "product": { "name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "product_id": "seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-js-debugger@1.0.3-0.el4.1?arch=i386" } } }, { "category": "product_version", "name": "devhelp-devel-0:0.10-0.2.el4.i386", "product": { "name": "devhelp-devel-0:0.10-0.2.el4.i386", "product_id": "devhelp-devel-0:0.10-0.2.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/devhelp-devel@0.10-0.2.el4?arch=i386" } } }, { "category": "product_version", "name": "devhelp-0:0.10-0.2.el4.i386", "product": { "name": "devhelp-0:0.10-0.2.el4.i386", "product_id": "devhelp-0:0.10-0.2.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/devhelp@0.10-0.2.el4?arch=i386" } } }, { "category": "product_version", "name": "devhelp-debuginfo-0:0.10-0.2.el4.i386", "product": { "name": "devhelp-debuginfo-0:0.10-0.2.el4.i386", "product_id": "devhelp-debuginfo-0:0.10-0.2.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/devhelp-debuginfo@0.10-0.2.el4?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "seamonkey-0:1.0.3-0.el4.1.src", "product": { "name": "seamonkey-0:1.0.3-0.el4.1.src", "product_id": "seamonkey-0:1.0.3-0.el4.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey@1.0.3-0.el4.1?arch=src" } } }, { "category": "product_version", "name": "devhelp-0:0.10-0.2.el4.src", "product": { "name": "devhelp-0:0.10-0.2.el4.src", "product_id": "devhelp-0:0.10-0.2.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/devhelp@0.10-0.2.el4?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "seamonkey-mail-0:1.0.3-0.el4.1.ppc", "product": { "name": "seamonkey-mail-0:1.0.3-0.el4.1.ppc", "product_id": "seamonkey-mail-0:1.0.3-0.el4.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-mail@1.0.3-0.el4.1?arch=ppc" } } }, { "category": "product_version", "name": "seamonkey-devel-0:1.0.3-0.el4.1.ppc", "product": { "name": "seamonkey-devel-0:1.0.3-0.el4.1.ppc", "product_id": "seamonkey-devel-0:1.0.3-0.el4.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-devel@1.0.3-0.el4.1?arch=ppc" } } }, { "category": "product_version", "name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "product": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "product_id": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-dom-inspector@1.0.3-0.el4.1?arch=ppc" } } }, { "category": "product_version", "name": "seamonkey-0:1.0.3-0.el4.1.ppc", "product": { "name": "seamonkey-0:1.0.3-0.el4.1.ppc", "product_id": "seamonkey-0:1.0.3-0.el4.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey@1.0.3-0.el4.1?arch=ppc" } } }, { "category": "product_version", "name": "seamonkey-chat-0:1.0.3-0.el4.1.ppc", "product": { "name": "seamonkey-chat-0:1.0.3-0.el4.1.ppc", "product_id": "seamonkey-chat-0:1.0.3-0.el4.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-chat@1.0.3-0.el4.1?arch=ppc" } } }, { "category": "product_version", "name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "product": { "name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "product_id": "seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-debuginfo@1.0.3-0.el4.1?arch=ppc" } } }, { "category": "product_version", "name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "product": { "name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "product_id": "seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-js-debugger@1.0.3-0.el4.1?arch=ppc" } } }, { "category": "product_version", "name": "devhelp-devel-0:0.10-0.2.el4.ppc", "product": { "name": "devhelp-devel-0:0.10-0.2.el4.ppc", "product_id": "devhelp-devel-0:0.10-0.2.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/devhelp-devel@0.10-0.2.el4?arch=ppc" } } }, { "category": "product_version", "name": "devhelp-0:0.10-0.2.el4.ppc", "product": { "name": "devhelp-0:0.10-0.2.el4.ppc", "product_id": "devhelp-0:0.10-0.2.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/devhelp@0.10-0.2.el4?arch=ppc" } } }, { "category": "product_version", "name": "devhelp-debuginfo-0:0.10-0.2.el4.ppc", "product": { "name": "devhelp-debuginfo-0:0.10-0.2.el4.ppc", "product_id": "devhelp-debuginfo-0:0.10-0.2.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/devhelp-debuginfo@0.10-0.2.el4?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "seamonkey-mail-0:1.0.3-0.el4.1.s390x", "product": { "name": "seamonkey-mail-0:1.0.3-0.el4.1.s390x", "product_id": "seamonkey-mail-0:1.0.3-0.el4.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-mail@1.0.3-0.el4.1?arch=s390x" } } }, { "category": "product_version", "name": "seamonkey-devel-0:1.0.3-0.el4.1.s390x", "product": { "name": "seamonkey-devel-0:1.0.3-0.el4.1.s390x", "product_id": "seamonkey-devel-0:1.0.3-0.el4.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-devel@1.0.3-0.el4.1?arch=s390x" } } }, { "category": "product_version", "name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "product": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "product_id": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-dom-inspector@1.0.3-0.el4.1?arch=s390x" } } }, { "category": "product_version", "name": "seamonkey-0:1.0.3-0.el4.1.s390x", "product": { "name": "seamonkey-0:1.0.3-0.el4.1.s390x", "product_id": "seamonkey-0:1.0.3-0.el4.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey@1.0.3-0.el4.1?arch=s390x" } } }, { "category": "product_version", "name": "seamonkey-chat-0:1.0.3-0.el4.1.s390x", "product": { "name": "seamonkey-chat-0:1.0.3-0.el4.1.s390x", "product_id": "seamonkey-chat-0:1.0.3-0.el4.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-chat@1.0.3-0.el4.1?arch=s390x" } } }, { "category": "product_version", "name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "product": { "name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "product_id": "seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-debuginfo@1.0.3-0.el4.1?arch=s390x" } } }, { "category": "product_version", "name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "product": { "name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "product_id": "seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-js-debugger@1.0.3-0.el4.1?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "seamonkey-mail-0:1.0.3-0.el4.1.s390", "product": { "name": "seamonkey-mail-0:1.0.3-0.el4.1.s390", "product_id": "seamonkey-mail-0:1.0.3-0.el4.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-mail@1.0.3-0.el4.1?arch=s390" } } }, { "category": "product_version", "name": "seamonkey-devel-0:1.0.3-0.el4.1.s390", "product": { "name": "seamonkey-devel-0:1.0.3-0.el4.1.s390", "product_id": "seamonkey-devel-0:1.0.3-0.el4.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-devel@1.0.3-0.el4.1?arch=s390" } } }, { "category": "product_version", "name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "product": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "product_id": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-dom-inspector@1.0.3-0.el4.1?arch=s390" } } }, { "category": "product_version", "name": "seamonkey-0:1.0.3-0.el4.1.s390", "product": { "name": "seamonkey-0:1.0.3-0.el4.1.s390", "product_id": "seamonkey-0:1.0.3-0.el4.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey@1.0.3-0.el4.1?arch=s390" } } }, { "category": "product_version", "name": "seamonkey-chat-0:1.0.3-0.el4.1.s390", "product": { "name": "seamonkey-chat-0:1.0.3-0.el4.1.s390", "product_id": "seamonkey-chat-0:1.0.3-0.el4.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-chat@1.0.3-0.el4.1?arch=s390" } } }, { "category": "product_version", "name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "product": { "name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "product_id": "seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-debuginfo@1.0.3-0.el4.1?arch=s390" } } }, { "category": "product_version", "name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "product": { "name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "product_id": "seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-js-debugger@1.0.3-0.el4.1?arch=s390" } } } ], "category": "architecture", "name": "s390" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "devhelp-0:0.10-0.2.el4.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:devhelp-0:0.10-0.2.el4.i386" }, "product_reference": "devhelp-0:0.10-0.2.el4.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-0:0.10-0.2.el4.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:devhelp-0:0.10-0.2.el4.ppc" }, "product_reference": "devhelp-0:0.10-0.2.el4.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-0:0.10-0.2.el4.src as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:devhelp-0:0.10-0.2.el4.src" }, "product_reference": "devhelp-0:0.10-0.2.el4.src", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-0:0.10-0.2.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:devhelp-0:0.10-0.2.el4.x86_64" }, "product_reference": "devhelp-0:0.10-0.2.el4.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-debuginfo-0:0.10-0.2.el4.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386" }, "product_reference": "devhelp-debuginfo-0:0.10-0.2.el4.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-debuginfo-0:0.10-0.2.el4.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc" }, "product_reference": "devhelp-debuginfo-0:0.10-0.2.el4.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-debuginfo-0:0.10-0.2.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64" }, "product_reference": "devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-devel-0:0.10-0.2.el4.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:devhelp-devel-0:0.10-0.2.el4.i386" }, "product_reference": "devhelp-devel-0:0.10-0.2.el4.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-devel-0:0.10-0.2.el4.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:devhelp-devel-0:0.10-0.2.el4.ppc" }, "product_reference": "devhelp-devel-0:0.10-0.2.el4.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-devel-0:0.10-0.2.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64" }, "product_reference": "devhelp-devel-0:0.10-0.2.el4.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el4.1.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-0:1.0.3-0.el4.1.i386" }, "product_reference": "seamonkey-0:1.0.3-0.el4.1.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el4.1.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-0:1.0.3-0.el4.1.ia64" }, "product_reference": "seamonkey-0:1.0.3-0.el4.1.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el4.1.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-0:1.0.3-0.el4.1.ppc" }, "product_reference": "seamonkey-0:1.0.3-0.el4.1.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el4.1.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-0:1.0.3-0.el4.1.s390" }, "product_reference": "seamonkey-0:1.0.3-0.el4.1.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el4.1.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-0:1.0.3-0.el4.1.s390x" }, "product_reference": "seamonkey-0:1.0.3-0.el4.1.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el4.1.src as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-0:1.0.3-0.el4.1.src" }, "product_reference": "seamonkey-0:1.0.3-0.el4.1.src", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64" }, "product_reference": "seamonkey-0:1.0.3-0.el4.1.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.3-0.el4.1.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386" }, "product_reference": "seamonkey-chat-0:1.0.3-0.el4.1.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.3-0.el4.1.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64" }, "product_reference": "seamonkey-chat-0:1.0.3-0.el4.1.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.3-0.el4.1.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc" }, "product_reference": "seamonkey-chat-0:1.0.3-0.el4.1.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.3-0.el4.1.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390" }, "product_reference": "seamonkey-chat-0:1.0.3-0.el4.1.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.3-0.el4.1.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x" }, "product_reference": "seamonkey-chat-0:1.0.3-0.el4.1.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.3-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64" }, "product_reference": "seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386" }, "product_reference": "seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64" }, "product_reference": "seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc" }, "product_reference": "seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390" }, "product_reference": "seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x" }, "product_reference": "seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64" }, "product_reference": "seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.3-0.el4.1.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386" }, "product_reference": "seamonkey-devel-0:1.0.3-0.el4.1.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.3-0.el4.1.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64" }, "product_reference": "seamonkey-devel-0:1.0.3-0.el4.1.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.3-0.el4.1.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc" }, "product_reference": "seamonkey-devel-0:1.0.3-0.el4.1.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.3-0.el4.1.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390" }, "product_reference": "seamonkey-devel-0:1.0.3-0.el4.1.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.3-0.el4.1.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x" }, "product_reference": "seamonkey-devel-0:1.0.3-0.el4.1.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.3-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64" }, "product_reference": "seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386" }, "product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64" }, "product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc" }, "product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390" }, "product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x" }, "product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64" }, "product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386" }, "product_reference": "seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64" }, "product_reference": "seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc" }, "product_reference": "seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390" }, "product_reference": "seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x" }, "product_reference": "seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64" }, "product_reference": "seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.3-0.el4.1.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386" }, "product_reference": "seamonkey-mail-0:1.0.3-0.el4.1.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.3-0.el4.1.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64" }, "product_reference": "seamonkey-mail-0:1.0.3-0.el4.1.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.3-0.el4.1.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc" }, "product_reference": "seamonkey-mail-0:1.0.3-0.el4.1.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.3-0.el4.1.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390" }, "product_reference": "seamonkey-mail-0:1.0.3-0.el4.1.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.3-0.el4.1.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x" }, "product_reference": "seamonkey-mail-0:1.0.3-0.el4.1.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.3-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" }, "product_reference": "seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-0:0.10-0.2.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:devhelp-0:0.10-0.2.el4.i386" }, "product_reference": "devhelp-0:0.10-0.2.el4.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-0:0.10-0.2.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:devhelp-0:0.10-0.2.el4.ppc" }, "product_reference": "devhelp-0:0.10-0.2.el4.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-0:0.10-0.2.el4.src as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:devhelp-0:0.10-0.2.el4.src" }, "product_reference": "devhelp-0:0.10-0.2.el4.src", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-0:0.10-0.2.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:devhelp-0:0.10-0.2.el4.x86_64" }, "product_reference": "devhelp-0:0.10-0.2.el4.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-debuginfo-0:0.10-0.2.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386" }, "product_reference": "devhelp-debuginfo-0:0.10-0.2.el4.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-debuginfo-0:0.10-0.2.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc" }, "product_reference": "devhelp-debuginfo-0:0.10-0.2.el4.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-debuginfo-0:0.10-0.2.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64" }, "product_reference": "devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-devel-0:0.10-0.2.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386" }, "product_reference": "devhelp-devel-0:0.10-0.2.el4.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-devel-0:0.10-0.2.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc" }, "product_reference": "devhelp-devel-0:0.10-0.2.el4.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-devel-0:0.10-0.2.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64" }, "product_reference": "devhelp-devel-0:0.10-0.2.el4.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el4.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386" }, "product_reference": "seamonkey-0:1.0.3-0.el4.1.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el4.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64" }, "product_reference": "seamonkey-0:1.0.3-0.el4.1.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el4.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc" }, "product_reference": "seamonkey-0:1.0.3-0.el4.1.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el4.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390" }, "product_reference": "seamonkey-0:1.0.3-0.el4.1.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el4.1.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x" }, "product_reference": "seamonkey-0:1.0.3-0.el4.1.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el4.1.src as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-0:1.0.3-0.el4.1.src" }, "product_reference": "seamonkey-0:1.0.3-0.el4.1.src", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64" }, "product_reference": "seamonkey-0:1.0.3-0.el4.1.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.3-0.el4.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386" }, "product_reference": "seamonkey-chat-0:1.0.3-0.el4.1.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.3-0.el4.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64" }, "product_reference": "seamonkey-chat-0:1.0.3-0.el4.1.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.3-0.el4.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc" }, "product_reference": "seamonkey-chat-0:1.0.3-0.el4.1.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.3-0.el4.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390" }, "product_reference": "seamonkey-chat-0:1.0.3-0.el4.1.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.3-0.el4.1.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x" }, "product_reference": "seamonkey-chat-0:1.0.3-0.el4.1.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.3-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64" }, "product_reference": "seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386" }, "product_reference": "seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64" }, "product_reference": "seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc" }, "product_reference": "seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390" }, "product_reference": "seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x" }, "product_reference": "seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64" }, "product_reference": "seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.3-0.el4.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386" }, "product_reference": "seamonkey-devel-0:1.0.3-0.el4.1.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.3-0.el4.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64" }, "product_reference": "seamonkey-devel-0:1.0.3-0.el4.1.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.3-0.el4.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc" }, "product_reference": "seamonkey-devel-0:1.0.3-0.el4.1.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.3-0.el4.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390" }, "product_reference": "seamonkey-devel-0:1.0.3-0.el4.1.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.3-0.el4.1.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x" }, "product_reference": "seamonkey-devel-0:1.0.3-0.el4.1.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.3-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64" }, "product_reference": "seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386" }, "product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64" }, "product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc" }, "product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390" }, "product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x" }, "product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64" }, "product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386" }, "product_reference": "seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64" }, "product_reference": "seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc" }, "product_reference": "seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390" }, "product_reference": "seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x" }, "product_reference": "seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64" }, "product_reference": "seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.3-0.el4.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386" }, "product_reference": "seamonkey-mail-0:1.0.3-0.el4.1.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.3-0.el4.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64" }, "product_reference": "seamonkey-mail-0:1.0.3-0.el4.1.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.3-0.el4.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc" }, "product_reference": "seamonkey-mail-0:1.0.3-0.el4.1.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.3-0.el4.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390" }, "product_reference": "seamonkey-mail-0:1.0.3-0.el4.1.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.3-0.el4.1.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x" }, "product_reference": "seamonkey-mail-0:1.0.3-0.el4.1.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.3-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" }, "product_reference": "seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-0:0.10-0.2.el4.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:devhelp-0:0.10-0.2.el4.i386" }, "product_reference": "devhelp-0:0.10-0.2.el4.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-0:0.10-0.2.el4.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:devhelp-0:0.10-0.2.el4.ppc" }, "product_reference": "devhelp-0:0.10-0.2.el4.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-0:0.10-0.2.el4.src as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:devhelp-0:0.10-0.2.el4.src" }, "product_reference": "devhelp-0:0.10-0.2.el4.src", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-0:0.10-0.2.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:devhelp-0:0.10-0.2.el4.x86_64" }, "product_reference": "devhelp-0:0.10-0.2.el4.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-debuginfo-0:0.10-0.2.el4.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386" }, "product_reference": "devhelp-debuginfo-0:0.10-0.2.el4.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-debuginfo-0:0.10-0.2.el4.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc" }, "product_reference": "devhelp-debuginfo-0:0.10-0.2.el4.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-debuginfo-0:0.10-0.2.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64" }, "product_reference": "devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-devel-0:0.10-0.2.el4.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:devhelp-devel-0:0.10-0.2.el4.i386" }, "product_reference": "devhelp-devel-0:0.10-0.2.el4.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-devel-0:0.10-0.2.el4.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:devhelp-devel-0:0.10-0.2.el4.ppc" }, "product_reference": "devhelp-devel-0:0.10-0.2.el4.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-devel-0:0.10-0.2.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64" }, "product_reference": "devhelp-devel-0:0.10-0.2.el4.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el4.1.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-0:1.0.3-0.el4.1.i386" }, "product_reference": "seamonkey-0:1.0.3-0.el4.1.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el4.1.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-0:1.0.3-0.el4.1.ia64" }, "product_reference": "seamonkey-0:1.0.3-0.el4.1.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el4.1.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-0:1.0.3-0.el4.1.ppc" }, "product_reference": "seamonkey-0:1.0.3-0.el4.1.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el4.1.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-0:1.0.3-0.el4.1.s390" }, "product_reference": "seamonkey-0:1.0.3-0.el4.1.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el4.1.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-0:1.0.3-0.el4.1.s390x" }, "product_reference": "seamonkey-0:1.0.3-0.el4.1.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el4.1.src as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-0:1.0.3-0.el4.1.src" }, "product_reference": "seamonkey-0:1.0.3-0.el4.1.src", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64" }, "product_reference": "seamonkey-0:1.0.3-0.el4.1.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.3-0.el4.1.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386" }, "product_reference": "seamonkey-chat-0:1.0.3-0.el4.1.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.3-0.el4.1.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64" }, "product_reference": "seamonkey-chat-0:1.0.3-0.el4.1.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.3-0.el4.1.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc" }, "product_reference": "seamonkey-chat-0:1.0.3-0.el4.1.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.3-0.el4.1.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390" }, "product_reference": "seamonkey-chat-0:1.0.3-0.el4.1.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.3-0.el4.1.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x" }, "product_reference": "seamonkey-chat-0:1.0.3-0.el4.1.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.3-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64" }, "product_reference": "seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386" }, "product_reference": "seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64" }, "product_reference": "seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc" }, "product_reference": "seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390" }, "product_reference": "seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x" }, "product_reference": "seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64" }, "product_reference": "seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.3-0.el4.1.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386" }, "product_reference": "seamonkey-devel-0:1.0.3-0.el4.1.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.3-0.el4.1.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64" }, "product_reference": "seamonkey-devel-0:1.0.3-0.el4.1.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.3-0.el4.1.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc" }, "product_reference": "seamonkey-devel-0:1.0.3-0.el4.1.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.3-0.el4.1.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390" }, "product_reference": "seamonkey-devel-0:1.0.3-0.el4.1.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.3-0.el4.1.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x" }, "product_reference": "seamonkey-devel-0:1.0.3-0.el4.1.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.3-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64" }, "product_reference": "seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386" }, "product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64" }, "product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc" }, "product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390" }, "product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x" }, "product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64" }, "product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386" }, "product_reference": "seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64" }, "product_reference": "seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc" }, "product_reference": "seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390" }, "product_reference": "seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x" }, "product_reference": "seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64" }, "product_reference": "seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.3-0.el4.1.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386" }, "product_reference": "seamonkey-mail-0:1.0.3-0.el4.1.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.3-0.el4.1.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64" }, "product_reference": "seamonkey-mail-0:1.0.3-0.el4.1.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.3-0.el4.1.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc" }, "product_reference": "seamonkey-mail-0:1.0.3-0.el4.1.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.3-0.el4.1.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390" }, "product_reference": "seamonkey-mail-0:1.0.3-0.el4.1.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.3-0.el4.1.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x" }, "product_reference": "seamonkey-mail-0:1.0.3-0.el4.1.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.3-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" }, "product_reference": "seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-0:0.10-0.2.el4.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:devhelp-0:0.10-0.2.el4.i386" }, "product_reference": "devhelp-0:0.10-0.2.el4.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-0:0.10-0.2.el4.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:devhelp-0:0.10-0.2.el4.ppc" }, "product_reference": "devhelp-0:0.10-0.2.el4.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-0:0.10-0.2.el4.src as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:devhelp-0:0.10-0.2.el4.src" }, "product_reference": "devhelp-0:0.10-0.2.el4.src", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-0:0.10-0.2.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:devhelp-0:0.10-0.2.el4.x86_64" }, "product_reference": "devhelp-0:0.10-0.2.el4.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-debuginfo-0:0.10-0.2.el4.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386" }, "product_reference": "devhelp-debuginfo-0:0.10-0.2.el4.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-debuginfo-0:0.10-0.2.el4.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc" }, "product_reference": "devhelp-debuginfo-0:0.10-0.2.el4.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-debuginfo-0:0.10-0.2.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64" }, "product_reference": "devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-devel-0:0.10-0.2.el4.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:devhelp-devel-0:0.10-0.2.el4.i386" }, "product_reference": "devhelp-devel-0:0.10-0.2.el4.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-devel-0:0.10-0.2.el4.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:devhelp-devel-0:0.10-0.2.el4.ppc" }, "product_reference": "devhelp-devel-0:0.10-0.2.el4.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-devel-0:0.10-0.2.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64" }, "product_reference": "devhelp-devel-0:0.10-0.2.el4.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el4.1.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-0:1.0.3-0.el4.1.i386" }, "product_reference": "seamonkey-0:1.0.3-0.el4.1.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el4.1.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-0:1.0.3-0.el4.1.ia64" }, "product_reference": "seamonkey-0:1.0.3-0.el4.1.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el4.1.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-0:1.0.3-0.el4.1.ppc" }, "product_reference": "seamonkey-0:1.0.3-0.el4.1.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el4.1.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-0:1.0.3-0.el4.1.s390" }, "product_reference": "seamonkey-0:1.0.3-0.el4.1.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el4.1.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-0:1.0.3-0.el4.1.s390x" }, "product_reference": "seamonkey-0:1.0.3-0.el4.1.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el4.1.src as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-0:1.0.3-0.el4.1.src" }, "product_reference": "seamonkey-0:1.0.3-0.el4.1.src", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64" }, "product_reference": "seamonkey-0:1.0.3-0.el4.1.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.3-0.el4.1.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386" }, "product_reference": "seamonkey-chat-0:1.0.3-0.el4.1.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.3-0.el4.1.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64" }, "product_reference": "seamonkey-chat-0:1.0.3-0.el4.1.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.3-0.el4.1.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc" }, "product_reference": "seamonkey-chat-0:1.0.3-0.el4.1.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.3-0.el4.1.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390" }, "product_reference": "seamonkey-chat-0:1.0.3-0.el4.1.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.3-0.el4.1.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x" }, "product_reference": "seamonkey-chat-0:1.0.3-0.el4.1.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.3-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64" }, "product_reference": "seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386" }, "product_reference": "seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64" }, "product_reference": "seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc" }, "product_reference": "seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390" }, "product_reference": "seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x" }, "product_reference": "seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64" }, "product_reference": "seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.3-0.el4.1.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386" }, "product_reference": "seamonkey-devel-0:1.0.3-0.el4.1.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.3-0.el4.1.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64" }, "product_reference": "seamonkey-devel-0:1.0.3-0.el4.1.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.3-0.el4.1.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc" }, "product_reference": "seamonkey-devel-0:1.0.3-0.el4.1.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.3-0.el4.1.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390" }, "product_reference": "seamonkey-devel-0:1.0.3-0.el4.1.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.3-0.el4.1.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x" }, "product_reference": "seamonkey-devel-0:1.0.3-0.el4.1.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.3-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64" }, "product_reference": "seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386" }, "product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64" }, "product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc" }, "product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390" }, "product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x" }, "product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64" }, "product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386" }, "product_reference": "seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64" }, "product_reference": "seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc" }, "product_reference": "seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390" }, "product_reference": "seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x" }, "product_reference": "seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64" }, "product_reference": "seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.3-0.el4.1.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386" }, "product_reference": "seamonkey-mail-0:1.0.3-0.el4.1.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.3-0.el4.1.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64" }, "product_reference": "seamonkey-mail-0:1.0.3-0.el4.1.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.3-0.el4.1.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc" }, "product_reference": "seamonkey-mail-0:1.0.3-0.el4.1.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.3-0.el4.1.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390" }, "product_reference": "seamonkey-mail-0:1.0.3-0.el4.1.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.3-0.el4.1.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x" }, "product_reference": "seamonkey-mail-0:1.0.3-0.el4.1.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.3-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" }, "product_reference": "seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "relates_to_product_reference": "4WS" } ] }, "vulnerabilities": [ { "cve": "CVE-2006-2776", "discovery_date": "2006-05-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618112" } ], "notes": [ { "category": "description", "text": "Certain privileged UI code in Mozilla Firefox and Thunderbird before 1.5.0.4 calls content-defined setters on an object prototype, which allows remote attackers to execute code at a higher privilege than intended.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:devhelp-0:0.10-0.2.el4.i386", "4AS:devhelp-0:0.10-0.2.el4.ppc", "4AS:devhelp-0:0.10-0.2.el4.src", "4AS:devhelp-0:0.10-0.2.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.2.el4.i386", "4AS:devhelp-devel-0:0.10-0.2.el4.ppc", "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4AS:seamonkey-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-0:1.0.3-0.el4.1.src", "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4Desktop:devhelp-0:0.10-0.2.el4.i386", "4Desktop:devhelp-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-0:0.10-0.2.el4.src", "4Desktop:devhelp-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-0:1.0.3-0.el4.1.src", "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4ES:devhelp-0:0.10-0.2.el4.i386", "4ES:devhelp-0:0.10-0.2.el4.ppc", "4ES:devhelp-0:0.10-0.2.el4.src", "4ES:devhelp-0:0.10-0.2.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.2.el4.i386", "4ES:devhelp-devel-0:0.10-0.2.el4.ppc", "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64", "4ES:seamonkey-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-0:1.0.3-0.el4.1.src", "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4WS:devhelp-0:0.10-0.2.el4.i386", "4WS:devhelp-0:0.10-0.2.el4.ppc", "4WS:devhelp-0:0.10-0.2.el4.src", "4WS:devhelp-0:0.10-0.2.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.2.el4.i386", "4WS:devhelp-devel-0:0.10-0.2.el4.ppc", "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4WS:seamonkey-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-0:1.0.3-0.el4.1.src", "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2776" }, { "category": "external", "summary": "RHBZ#1618112", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618112" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2776", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2776" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2776", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2776" } ], "release_date": "2006-06-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-08-02T18:39:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nMultilib systems may experience difficulty if trying to specify the package\nby name to the Update Agent via a command line argument. This can be\nsolved by executing the following commands:\n\nup2date seamonkey; up2date seamonkey-nss seamonkey-nspr", "product_ids": [ "4AS:devhelp-0:0.10-0.2.el4.i386", "4AS:devhelp-0:0.10-0.2.el4.ppc", "4AS:devhelp-0:0.10-0.2.el4.src", "4AS:devhelp-0:0.10-0.2.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.2.el4.i386", "4AS:devhelp-devel-0:0.10-0.2.el4.ppc", "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4AS:seamonkey-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-0:1.0.3-0.el4.1.src", "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4Desktop:devhelp-0:0.10-0.2.el4.i386", "4Desktop:devhelp-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-0:0.10-0.2.el4.src", "4Desktop:devhelp-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-0:1.0.3-0.el4.1.src", "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4ES:devhelp-0:0.10-0.2.el4.i386", "4ES:devhelp-0:0.10-0.2.el4.ppc", "4ES:devhelp-0:0.10-0.2.el4.src", "4ES:devhelp-0:0.10-0.2.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.2.el4.i386", "4ES:devhelp-devel-0:0.10-0.2.el4.ppc", "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64", "4ES:seamonkey-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-0:1.0.3-0.el4.1.src", "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4WS:devhelp-0:0.10-0.2.el4.i386", "4WS:devhelp-0:0.10-0.2.el4.ppc", "4WS:devhelp-0:0.10-0.2.el4.src", "4WS:devhelp-0:0.10-0.2.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.2.el4.i386", "4WS:devhelp-devel-0:0.10-0.2.el4.ppc", "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4WS:seamonkey-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-0:1.0.3-0.el4.1.src", "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0609" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2006-2778", "discovery_date": "2006-05-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618113" } ], "notes": [ { "category": "description", "text": "The crypto.signText function in Mozilla Firefox and Thunderbird before 1.5.0.4 allows remote attackers to execute arbitrary code via certain optional Certificate Authority name arguments, which causes an invalid array index and triggers a buffer overflow.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:devhelp-0:0.10-0.2.el4.i386", "4AS:devhelp-0:0.10-0.2.el4.ppc", "4AS:devhelp-0:0.10-0.2.el4.src", "4AS:devhelp-0:0.10-0.2.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.2.el4.i386", "4AS:devhelp-devel-0:0.10-0.2.el4.ppc", "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4AS:seamonkey-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-0:1.0.3-0.el4.1.src", "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4Desktop:devhelp-0:0.10-0.2.el4.i386", "4Desktop:devhelp-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-0:0.10-0.2.el4.src", "4Desktop:devhelp-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-0:1.0.3-0.el4.1.src", "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4ES:devhelp-0:0.10-0.2.el4.i386", "4ES:devhelp-0:0.10-0.2.el4.ppc", "4ES:devhelp-0:0.10-0.2.el4.src", "4ES:devhelp-0:0.10-0.2.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.2.el4.i386", "4ES:devhelp-devel-0:0.10-0.2.el4.ppc", "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64", "4ES:seamonkey-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-0:1.0.3-0.el4.1.src", "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4WS:devhelp-0:0.10-0.2.el4.i386", "4WS:devhelp-0:0.10-0.2.el4.ppc", "4WS:devhelp-0:0.10-0.2.el4.src", "4WS:devhelp-0:0.10-0.2.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.2.el4.i386", "4WS:devhelp-devel-0:0.10-0.2.el4.ppc", "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4WS:seamonkey-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-0:1.0.3-0.el4.1.src", "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2778" }, { "category": "external", "summary": "RHBZ#1618113", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618113" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2778", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2778" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2778", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2778" } ], "release_date": "2006-06-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-08-02T18:39:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nMultilib systems may experience difficulty if trying to specify the package\nby name to the Update Agent via a command line argument. This can be\nsolved by executing the following commands:\n\nup2date seamonkey; up2date seamonkey-nss seamonkey-nspr", "product_ids": [ "4AS:devhelp-0:0.10-0.2.el4.i386", "4AS:devhelp-0:0.10-0.2.el4.ppc", "4AS:devhelp-0:0.10-0.2.el4.src", "4AS:devhelp-0:0.10-0.2.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.2.el4.i386", "4AS:devhelp-devel-0:0.10-0.2.el4.ppc", "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4AS:seamonkey-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-0:1.0.3-0.el4.1.src", "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4Desktop:devhelp-0:0.10-0.2.el4.i386", "4Desktop:devhelp-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-0:0.10-0.2.el4.src", "4Desktop:devhelp-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-0:1.0.3-0.el4.1.src", "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4ES:devhelp-0:0.10-0.2.el4.i386", "4ES:devhelp-0:0.10-0.2.el4.ppc", "4ES:devhelp-0:0.10-0.2.el4.src", "4ES:devhelp-0:0.10-0.2.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.2.el4.i386", "4ES:devhelp-devel-0:0.10-0.2.el4.ppc", "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64", "4ES:seamonkey-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-0:1.0.3-0.el4.1.src", "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4WS:devhelp-0:0.10-0.2.el4.i386", "4WS:devhelp-0:0.10-0.2.el4.ppc", "4WS:devhelp-0:0.10-0.2.el4.src", "4WS:devhelp-0:0.10-0.2.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.2.el4.i386", "4WS:devhelp-devel-0:0.10-0.2.el4.ppc", "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4WS:seamonkey-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-0:1.0.3-0.el4.1.src", "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0609" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2006-2779", "discovery_date": "2006-06-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618114" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox and Thunderbird before 1.5.0.4 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via (1) nested \u003coption\u003e tags in a select tag, (2) a DOMNodeRemoved mutation event, (3) \"Content-implemented tree views,\" (4) BoxObjects, (5) the XBL implementation, (6) an iframe that attempts to remove itself, which leads to memory corruption.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:devhelp-0:0.10-0.2.el4.i386", "4AS:devhelp-0:0.10-0.2.el4.ppc", "4AS:devhelp-0:0.10-0.2.el4.src", "4AS:devhelp-0:0.10-0.2.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.2.el4.i386", "4AS:devhelp-devel-0:0.10-0.2.el4.ppc", "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4AS:seamonkey-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-0:1.0.3-0.el4.1.src", "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4Desktop:devhelp-0:0.10-0.2.el4.i386", "4Desktop:devhelp-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-0:0.10-0.2.el4.src", "4Desktop:devhelp-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-0:1.0.3-0.el4.1.src", "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4ES:devhelp-0:0.10-0.2.el4.i386", "4ES:devhelp-0:0.10-0.2.el4.ppc", "4ES:devhelp-0:0.10-0.2.el4.src", "4ES:devhelp-0:0.10-0.2.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.2.el4.i386", "4ES:devhelp-devel-0:0.10-0.2.el4.ppc", "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64", "4ES:seamonkey-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-0:1.0.3-0.el4.1.src", "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4WS:devhelp-0:0.10-0.2.el4.i386", "4WS:devhelp-0:0.10-0.2.el4.ppc", "4WS:devhelp-0:0.10-0.2.el4.src", "4WS:devhelp-0:0.10-0.2.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.2.el4.i386", "4WS:devhelp-devel-0:0.10-0.2.el4.ppc", "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4WS:seamonkey-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-0:1.0.3-0.el4.1.src", "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2779" }, { "category": "external", "summary": "RHBZ#1618114", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618114" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2779", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2779" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2779", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2779" } ], "release_date": "2006-06-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-08-02T18:39:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nMultilib systems may experience difficulty if trying to specify the package\nby name to the Update Agent via a command line argument. This can be\nsolved by executing the following commands:\n\nup2date seamonkey; up2date seamonkey-nss seamonkey-nspr", "product_ids": [ "4AS:devhelp-0:0.10-0.2.el4.i386", "4AS:devhelp-0:0.10-0.2.el4.ppc", "4AS:devhelp-0:0.10-0.2.el4.src", "4AS:devhelp-0:0.10-0.2.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.2.el4.i386", "4AS:devhelp-devel-0:0.10-0.2.el4.ppc", "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4AS:seamonkey-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-0:1.0.3-0.el4.1.src", "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4Desktop:devhelp-0:0.10-0.2.el4.i386", "4Desktop:devhelp-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-0:0.10-0.2.el4.src", "4Desktop:devhelp-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-0:1.0.3-0.el4.1.src", "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4ES:devhelp-0:0.10-0.2.el4.i386", "4ES:devhelp-0:0.10-0.2.el4.ppc", "4ES:devhelp-0:0.10-0.2.el4.src", "4ES:devhelp-0:0.10-0.2.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.2.el4.i386", "4ES:devhelp-devel-0:0.10-0.2.el4.ppc", "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64", "4ES:seamonkey-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-0:1.0.3-0.el4.1.src", "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4WS:devhelp-0:0.10-0.2.el4.i386", "4WS:devhelp-0:0.10-0.2.el4.ppc", "4WS:devhelp-0:0.10-0.2.el4.src", "4WS:devhelp-0:0.10-0.2.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.2.el4.i386", "4WS:devhelp-devel-0:0.10-0.2.el4.ppc", "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4WS:seamonkey-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-0:1.0.3-0.el4.1.src", "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0609" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-2780", "discovery_date": "2006-06-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618115" } ], "notes": [ { "category": "description", "text": "Integer overflow in Mozilla Firefox and Thunderbird before 1.5.0.4 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via \"jsstr tagify,\" which leads to memory corruption.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:devhelp-0:0.10-0.2.el4.i386", "4AS:devhelp-0:0.10-0.2.el4.ppc", "4AS:devhelp-0:0.10-0.2.el4.src", "4AS:devhelp-0:0.10-0.2.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.2.el4.i386", "4AS:devhelp-devel-0:0.10-0.2.el4.ppc", "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4AS:seamonkey-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-0:1.0.3-0.el4.1.src", "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4Desktop:devhelp-0:0.10-0.2.el4.i386", "4Desktop:devhelp-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-0:0.10-0.2.el4.src", "4Desktop:devhelp-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-0:1.0.3-0.el4.1.src", "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4ES:devhelp-0:0.10-0.2.el4.i386", "4ES:devhelp-0:0.10-0.2.el4.ppc", "4ES:devhelp-0:0.10-0.2.el4.src", "4ES:devhelp-0:0.10-0.2.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.2.el4.i386", "4ES:devhelp-devel-0:0.10-0.2.el4.ppc", "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64", "4ES:seamonkey-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-0:1.0.3-0.el4.1.src", "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4WS:devhelp-0:0.10-0.2.el4.i386", "4WS:devhelp-0:0.10-0.2.el4.ppc", "4WS:devhelp-0:0.10-0.2.el4.src", "4WS:devhelp-0:0.10-0.2.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.2.el4.i386", "4WS:devhelp-devel-0:0.10-0.2.el4.ppc", "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4WS:seamonkey-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-0:1.0.3-0.el4.1.src", "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2780" }, { "category": "external", "summary": "RHBZ#1618115", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618115" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2780", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2780" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2780", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2780" } ], "release_date": "2006-06-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-08-02T18:39:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nMultilib systems may experience difficulty if trying to specify the package\nby name to the Update Agent via a command line argument. This can be\nsolved by executing the following commands:\n\nup2date seamonkey; up2date seamonkey-nss seamonkey-nspr", "product_ids": [ "4AS:devhelp-0:0.10-0.2.el4.i386", "4AS:devhelp-0:0.10-0.2.el4.ppc", "4AS:devhelp-0:0.10-0.2.el4.src", "4AS:devhelp-0:0.10-0.2.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.2.el4.i386", "4AS:devhelp-devel-0:0.10-0.2.el4.ppc", "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4AS:seamonkey-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-0:1.0.3-0.el4.1.src", "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4Desktop:devhelp-0:0.10-0.2.el4.i386", "4Desktop:devhelp-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-0:0.10-0.2.el4.src", "4Desktop:devhelp-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-0:1.0.3-0.el4.1.src", "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4ES:devhelp-0:0.10-0.2.el4.i386", "4ES:devhelp-0:0.10-0.2.el4.ppc", "4ES:devhelp-0:0.10-0.2.el4.src", "4ES:devhelp-0:0.10-0.2.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.2.el4.i386", "4ES:devhelp-devel-0:0.10-0.2.el4.ppc", "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64", "4ES:seamonkey-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-0:1.0.3-0.el4.1.src", "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4WS:devhelp-0:0.10-0.2.el4.i386", "4WS:devhelp-0:0.10-0.2.el4.ppc", "4WS:devhelp-0:0.10-0.2.el4.src", "4WS:devhelp-0:0.10-0.2.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.2.el4.i386", "4WS:devhelp-devel-0:0.10-0.2.el4.ppc", "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4WS:seamonkey-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-0:1.0.3-0.el4.1.src", "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0609" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-2781", "discovery_date": "2006-06-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "193963" } ], "notes": [ { "category": "description", "text": "Double free vulnerability in nsVCard.cpp in Mozilla Thunderbird before 1.5.0.4 and SeaMonkey before 1.0.2 allows remote attackers to cause a denial of service (hang) and possibly execute arbitrary code via a VCard that contains invalid base64 characters.", "title": "Vulnerability description" }, { "category": "summary", "text": "(seamonkey): DOS/arbitrary code execution vuln with vcards", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:devhelp-0:0.10-0.2.el4.i386", "4AS:devhelp-0:0.10-0.2.el4.ppc", "4AS:devhelp-0:0.10-0.2.el4.src", "4AS:devhelp-0:0.10-0.2.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.2.el4.i386", "4AS:devhelp-devel-0:0.10-0.2.el4.ppc", "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4AS:seamonkey-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-0:1.0.3-0.el4.1.src", "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4Desktop:devhelp-0:0.10-0.2.el4.i386", "4Desktop:devhelp-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-0:0.10-0.2.el4.src", "4Desktop:devhelp-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-0:1.0.3-0.el4.1.src", "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4ES:devhelp-0:0.10-0.2.el4.i386", "4ES:devhelp-0:0.10-0.2.el4.ppc", "4ES:devhelp-0:0.10-0.2.el4.src", "4ES:devhelp-0:0.10-0.2.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.2.el4.i386", "4ES:devhelp-devel-0:0.10-0.2.el4.ppc", "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64", "4ES:seamonkey-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-0:1.0.3-0.el4.1.src", "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4WS:devhelp-0:0.10-0.2.el4.i386", "4WS:devhelp-0:0.10-0.2.el4.ppc", "4WS:devhelp-0:0.10-0.2.el4.src", "4WS:devhelp-0:0.10-0.2.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.2.el4.i386", "4WS:devhelp-devel-0:0.10-0.2.el4.ppc", "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4WS:seamonkey-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-0:1.0.3-0.el4.1.src", "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2781" }, { "category": "external", "summary": "RHBZ#193963", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=193963" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2781", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2781" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2781", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2781" } ], "release_date": "2006-06-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-08-02T18:39:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nMultilib systems may experience difficulty if trying to specify the package\nby name to the Update Agent via a command line argument. This can be\nsolved by executing the following commands:\n\nup2date seamonkey; up2date seamonkey-nss seamonkey-nspr", "product_ids": [ "4AS:devhelp-0:0.10-0.2.el4.i386", "4AS:devhelp-0:0.10-0.2.el4.ppc", "4AS:devhelp-0:0.10-0.2.el4.src", "4AS:devhelp-0:0.10-0.2.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.2.el4.i386", "4AS:devhelp-devel-0:0.10-0.2.el4.ppc", "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4AS:seamonkey-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-0:1.0.3-0.el4.1.src", "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4Desktop:devhelp-0:0.10-0.2.el4.i386", "4Desktop:devhelp-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-0:0.10-0.2.el4.src", "4Desktop:devhelp-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-0:1.0.3-0.el4.1.src", "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4ES:devhelp-0:0.10-0.2.el4.i386", "4ES:devhelp-0:0.10-0.2.el4.ppc", "4ES:devhelp-0:0.10-0.2.el4.src", "4ES:devhelp-0:0.10-0.2.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.2.el4.i386", "4ES:devhelp-devel-0:0.10-0.2.el4.ppc", "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64", "4ES:seamonkey-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-0:1.0.3-0.el4.1.src", "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4WS:devhelp-0:0.10-0.2.el4.i386", "4WS:devhelp-0:0.10-0.2.el4.ppc", "4WS:devhelp-0:0.10-0.2.el4.src", "4WS:devhelp-0:0.10-0.2.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.2.el4.i386", "4WS:devhelp-devel-0:0.10-0.2.el4.ppc", "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4WS:seamonkey-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-0:1.0.3-0.el4.1.src", "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0609" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "(seamonkey): DOS/arbitrary code execution vuln with vcards" }, { "cve": "CVE-2006-2782", "discovery_date": "2006-05-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618116" } ], "notes": [ { "category": "description", "text": "Firefox 1.5.0.2 does not fix all test cases associated with CVE-2006-1729, which allows remote attackers to read arbitrary files by inserting the target filename into a text box, then turning that box into a file upload control.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:devhelp-0:0.10-0.2.el4.i386", "4AS:devhelp-0:0.10-0.2.el4.ppc", "4AS:devhelp-0:0.10-0.2.el4.src", "4AS:devhelp-0:0.10-0.2.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.2.el4.i386", "4AS:devhelp-devel-0:0.10-0.2.el4.ppc", "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4AS:seamonkey-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-0:1.0.3-0.el4.1.src", "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4Desktop:devhelp-0:0.10-0.2.el4.i386", "4Desktop:devhelp-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-0:0.10-0.2.el4.src", "4Desktop:devhelp-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-0:1.0.3-0.el4.1.src", "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4ES:devhelp-0:0.10-0.2.el4.i386", "4ES:devhelp-0:0.10-0.2.el4.ppc", "4ES:devhelp-0:0.10-0.2.el4.src", "4ES:devhelp-0:0.10-0.2.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.2.el4.i386", "4ES:devhelp-devel-0:0.10-0.2.el4.ppc", "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64", "4ES:seamonkey-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-0:1.0.3-0.el4.1.src", "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4WS:devhelp-0:0.10-0.2.el4.i386", "4WS:devhelp-0:0.10-0.2.el4.ppc", "4WS:devhelp-0:0.10-0.2.el4.src", "4WS:devhelp-0:0.10-0.2.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.2.el4.i386", "4WS:devhelp-devel-0:0.10-0.2.el4.ppc", "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4WS:seamonkey-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-0:1.0.3-0.el4.1.src", "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2782" }, { "category": "external", "summary": "RHBZ#1618116", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618116" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2782", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2782" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2782", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2782" } ], "release_date": "2006-06-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-08-02T18:39:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nMultilib systems may experience difficulty if trying to specify the package\nby name to the Update Agent via a command line argument. This can be\nsolved by executing the following commands:\n\nup2date seamonkey; up2date seamonkey-nss seamonkey-nspr", "product_ids": [ "4AS:devhelp-0:0.10-0.2.el4.i386", "4AS:devhelp-0:0.10-0.2.el4.ppc", "4AS:devhelp-0:0.10-0.2.el4.src", "4AS:devhelp-0:0.10-0.2.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.2.el4.i386", "4AS:devhelp-devel-0:0.10-0.2.el4.ppc", "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4AS:seamonkey-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-0:1.0.3-0.el4.1.src", "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4Desktop:devhelp-0:0.10-0.2.el4.i386", "4Desktop:devhelp-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-0:0.10-0.2.el4.src", "4Desktop:devhelp-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-0:1.0.3-0.el4.1.src", "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4ES:devhelp-0:0.10-0.2.el4.i386", "4ES:devhelp-0:0.10-0.2.el4.ppc", "4ES:devhelp-0:0.10-0.2.el4.src", "4ES:devhelp-0:0.10-0.2.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.2.el4.i386", "4ES:devhelp-devel-0:0.10-0.2.el4.ppc", "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64", "4ES:seamonkey-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-0:1.0.3-0.el4.1.src", "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4WS:devhelp-0:0.10-0.2.el4.i386", "4WS:devhelp-0:0.10-0.2.el4.ppc", "4WS:devhelp-0:0.10-0.2.el4.src", "4WS:devhelp-0:0.10-0.2.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.2.el4.i386", "4WS:devhelp-devel-0:0.10-0.2.el4.ppc", "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4WS:seamonkey-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-0:1.0.3-0.el4.1.src", "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0609" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2006-2783", "discovery_date": "2006-05-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618117" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox and Thunderbird before 1.5.0.4 strip the Unicode Byte-order-Mark (BOM) from a UTF-8 page before the page is passed to the parser, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a BOM sequence in the middle of a dangerous tag such as SCRIPT.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:devhelp-0:0.10-0.2.el4.i386", "4AS:devhelp-0:0.10-0.2.el4.ppc", "4AS:devhelp-0:0.10-0.2.el4.src", "4AS:devhelp-0:0.10-0.2.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.2.el4.i386", "4AS:devhelp-devel-0:0.10-0.2.el4.ppc", "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4AS:seamonkey-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-0:1.0.3-0.el4.1.src", "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4Desktop:devhelp-0:0.10-0.2.el4.i386", "4Desktop:devhelp-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-0:0.10-0.2.el4.src", "4Desktop:devhelp-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-0:1.0.3-0.el4.1.src", "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4ES:devhelp-0:0.10-0.2.el4.i386", "4ES:devhelp-0:0.10-0.2.el4.ppc", "4ES:devhelp-0:0.10-0.2.el4.src", "4ES:devhelp-0:0.10-0.2.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.2.el4.i386", "4ES:devhelp-devel-0:0.10-0.2.el4.ppc", "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64", "4ES:seamonkey-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-0:1.0.3-0.el4.1.src", "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4WS:devhelp-0:0.10-0.2.el4.i386", "4WS:devhelp-0:0.10-0.2.el4.ppc", "4WS:devhelp-0:0.10-0.2.el4.src", "4WS:devhelp-0:0.10-0.2.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.2.el4.i386", "4WS:devhelp-devel-0:0.10-0.2.el4.ppc", "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4WS:seamonkey-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-0:1.0.3-0.el4.1.src", "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2783" }, { "category": "external", "summary": "RHBZ#1618117", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618117" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2783", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2783" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2783", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2783" } ], "release_date": "2006-06-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-08-02T18:39:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nMultilib systems may experience difficulty if trying to specify the package\nby name to the Update Agent via a command line argument. This can be\nsolved by executing the following commands:\n\nup2date seamonkey; up2date seamonkey-nss seamonkey-nspr", "product_ids": [ "4AS:devhelp-0:0.10-0.2.el4.i386", "4AS:devhelp-0:0.10-0.2.el4.ppc", "4AS:devhelp-0:0.10-0.2.el4.src", "4AS:devhelp-0:0.10-0.2.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.2.el4.i386", "4AS:devhelp-devel-0:0.10-0.2.el4.ppc", "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4AS:seamonkey-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-0:1.0.3-0.el4.1.src", "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4Desktop:devhelp-0:0.10-0.2.el4.i386", "4Desktop:devhelp-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-0:0.10-0.2.el4.src", "4Desktop:devhelp-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-0:1.0.3-0.el4.1.src", "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4ES:devhelp-0:0.10-0.2.el4.i386", "4ES:devhelp-0:0.10-0.2.el4.ppc", "4ES:devhelp-0:0.10-0.2.el4.src", "4ES:devhelp-0:0.10-0.2.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.2.el4.i386", "4ES:devhelp-devel-0:0.10-0.2.el4.ppc", "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64", "4ES:seamonkey-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-0:1.0.3-0.el4.1.src", "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4WS:devhelp-0:0.10-0.2.el4.i386", "4WS:devhelp-0:0.10-0.2.el4.ppc", "4WS:devhelp-0:0.10-0.2.el4.src", "4WS:devhelp-0:0.10-0.2.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.2.el4.i386", "4WS:devhelp-devel-0:0.10-0.2.el4.ppc", "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4WS:seamonkey-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-0:1.0.3-0.el4.1.src", "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0609" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2006-2784", "discovery_date": "2006-05-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618118" } ], "notes": [ { "category": "description", "text": "The PLUGINSPAGE functionality in Mozilla Firefox before 1.5.0.4 allows remote user-assisted attackers to execute privileged code by tricking a user into installing missing plugins and selecting the \"Manual Install\" button, then using nested javascript: URLs. NOTE: the manual install button is used for downloading software from a remote web site, so this issue would not cross privilege boundaries if the user progresses to the point of installing malicious software from the attacker-controlled site.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:devhelp-0:0.10-0.2.el4.i386", "4AS:devhelp-0:0.10-0.2.el4.ppc", "4AS:devhelp-0:0.10-0.2.el4.src", "4AS:devhelp-0:0.10-0.2.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.2.el4.i386", "4AS:devhelp-devel-0:0.10-0.2.el4.ppc", "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4AS:seamonkey-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-0:1.0.3-0.el4.1.src", "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4Desktop:devhelp-0:0.10-0.2.el4.i386", "4Desktop:devhelp-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-0:0.10-0.2.el4.src", "4Desktop:devhelp-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-0:1.0.3-0.el4.1.src", "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4ES:devhelp-0:0.10-0.2.el4.i386", "4ES:devhelp-0:0.10-0.2.el4.ppc", "4ES:devhelp-0:0.10-0.2.el4.src", "4ES:devhelp-0:0.10-0.2.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.2.el4.i386", "4ES:devhelp-devel-0:0.10-0.2.el4.ppc", "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64", "4ES:seamonkey-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-0:1.0.3-0.el4.1.src", "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4WS:devhelp-0:0.10-0.2.el4.i386", "4WS:devhelp-0:0.10-0.2.el4.ppc", "4WS:devhelp-0:0.10-0.2.el4.src", "4WS:devhelp-0:0.10-0.2.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.2.el4.i386", "4WS:devhelp-devel-0:0.10-0.2.el4.ppc", "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4WS:seamonkey-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-0:1.0.3-0.el4.1.src", "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2784" }, { "category": "external", "summary": "RHBZ#1618118", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618118" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2784", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2784" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2784", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2784" } ], "release_date": "2006-06-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-08-02T18:39:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nMultilib systems may experience difficulty if trying to specify the package\nby name to the Update Agent via a command line argument. This can be\nsolved by executing the following commands:\n\nup2date seamonkey; up2date seamonkey-nss seamonkey-nspr", "product_ids": [ "4AS:devhelp-0:0.10-0.2.el4.i386", "4AS:devhelp-0:0.10-0.2.el4.ppc", "4AS:devhelp-0:0.10-0.2.el4.src", "4AS:devhelp-0:0.10-0.2.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.2.el4.i386", "4AS:devhelp-devel-0:0.10-0.2.el4.ppc", "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4AS:seamonkey-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-0:1.0.3-0.el4.1.src", "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4Desktop:devhelp-0:0.10-0.2.el4.i386", "4Desktop:devhelp-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-0:0.10-0.2.el4.src", "4Desktop:devhelp-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-0:1.0.3-0.el4.1.src", "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4ES:devhelp-0:0.10-0.2.el4.i386", "4ES:devhelp-0:0.10-0.2.el4.ppc", "4ES:devhelp-0:0.10-0.2.el4.src", "4ES:devhelp-0:0.10-0.2.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.2.el4.i386", "4ES:devhelp-devel-0:0.10-0.2.el4.ppc", "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64", "4ES:seamonkey-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-0:1.0.3-0.el4.1.src", "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4WS:devhelp-0:0.10-0.2.el4.i386", "4WS:devhelp-0:0.10-0.2.el4.ppc", "4WS:devhelp-0:0.10-0.2.el4.src", "4WS:devhelp-0:0.10-0.2.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.2.el4.i386", "4WS:devhelp-devel-0:0.10-0.2.el4.ppc", "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4WS:seamonkey-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-0:1.0.3-0.el4.1.src", "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0609" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2006-2785", "discovery_date": "2006-05-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618119" } ], "notes": [ { "category": "description", "text": "Cross-site scripting (XSS) vulnerability in Mozilla Firefox before 1.5.0.4 allows user-assisted remote attackers to inject arbitrary web script or HTML by tricking a user into (1) performing a \"View Image\" on a broken image in which the SRC attribute contains a Javascript URL, or (2) selecting \"Show only this frame\" on a frame whose SRC attribute contains a Javascript URL.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:devhelp-0:0.10-0.2.el4.i386", "4AS:devhelp-0:0.10-0.2.el4.ppc", "4AS:devhelp-0:0.10-0.2.el4.src", "4AS:devhelp-0:0.10-0.2.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.2.el4.i386", "4AS:devhelp-devel-0:0.10-0.2.el4.ppc", "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4AS:seamonkey-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-0:1.0.3-0.el4.1.src", "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4Desktop:devhelp-0:0.10-0.2.el4.i386", "4Desktop:devhelp-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-0:0.10-0.2.el4.src", "4Desktop:devhelp-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-0:1.0.3-0.el4.1.src", "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4ES:devhelp-0:0.10-0.2.el4.i386", "4ES:devhelp-0:0.10-0.2.el4.ppc", "4ES:devhelp-0:0.10-0.2.el4.src", "4ES:devhelp-0:0.10-0.2.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.2.el4.i386", "4ES:devhelp-devel-0:0.10-0.2.el4.ppc", "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64", "4ES:seamonkey-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-0:1.0.3-0.el4.1.src", "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4WS:devhelp-0:0.10-0.2.el4.i386", "4WS:devhelp-0:0.10-0.2.el4.ppc", "4WS:devhelp-0:0.10-0.2.el4.src", "4WS:devhelp-0:0.10-0.2.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.2.el4.i386", "4WS:devhelp-devel-0:0.10-0.2.el4.ppc", "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4WS:seamonkey-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-0:1.0.3-0.el4.1.src", "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2785" }, { "category": "external", "summary": "RHBZ#1618119", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618119" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2785", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2785" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2785", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2785" } ], "release_date": "2006-06-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-08-02T18:39:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nMultilib systems may experience difficulty if trying to specify the package\nby name to the Update Agent via a command line argument. This can be\nsolved by executing the following commands:\n\nup2date seamonkey; up2date seamonkey-nss seamonkey-nspr", "product_ids": [ "4AS:devhelp-0:0.10-0.2.el4.i386", "4AS:devhelp-0:0.10-0.2.el4.ppc", "4AS:devhelp-0:0.10-0.2.el4.src", "4AS:devhelp-0:0.10-0.2.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.2.el4.i386", "4AS:devhelp-devel-0:0.10-0.2.el4.ppc", "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4AS:seamonkey-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-0:1.0.3-0.el4.1.src", "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4Desktop:devhelp-0:0.10-0.2.el4.i386", "4Desktop:devhelp-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-0:0.10-0.2.el4.src", "4Desktop:devhelp-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-0:1.0.3-0.el4.1.src", "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4ES:devhelp-0:0.10-0.2.el4.i386", "4ES:devhelp-0:0.10-0.2.el4.ppc", "4ES:devhelp-0:0.10-0.2.el4.src", "4ES:devhelp-0:0.10-0.2.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.2.el4.i386", "4ES:devhelp-devel-0:0.10-0.2.el4.ppc", "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64", "4ES:seamonkey-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-0:1.0.3-0.el4.1.src", "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4WS:devhelp-0:0.10-0.2.el4.i386", "4WS:devhelp-0:0.10-0.2.el4.ppc", "4WS:devhelp-0:0.10-0.2.el4.src", "4WS:devhelp-0:0.10-0.2.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.2.el4.i386", "4WS:devhelp-devel-0:0.10-0.2.el4.ppc", "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4WS:seamonkey-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-0:1.0.3-0.el4.1.src", "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0609" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2006-2786", "discovery_date": "2006-05-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618120" } ], "notes": [ { "category": "description", "text": "HTTP response smuggling vulnerability in Mozilla Firefox and Thunderbird before 1.5.0.4, when used with certain proxy servers, allows remote attackers to cause Firefox to interpret certain responses as if they were responses from two different sites via (1) invalid HTTP response headers with spaces between the header name and the colon, which might not be ignored in some cases, or (2) HTTP 1.1 headers through an HTTP 1.0 proxy, which are ignored by the proxy but processed by the client.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:devhelp-0:0.10-0.2.el4.i386", "4AS:devhelp-0:0.10-0.2.el4.ppc", "4AS:devhelp-0:0.10-0.2.el4.src", "4AS:devhelp-0:0.10-0.2.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.2.el4.i386", "4AS:devhelp-devel-0:0.10-0.2.el4.ppc", "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4AS:seamonkey-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-0:1.0.3-0.el4.1.src", "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4Desktop:devhelp-0:0.10-0.2.el4.i386", "4Desktop:devhelp-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-0:0.10-0.2.el4.src", "4Desktop:devhelp-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-0:1.0.3-0.el4.1.src", "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4ES:devhelp-0:0.10-0.2.el4.i386", "4ES:devhelp-0:0.10-0.2.el4.ppc", "4ES:devhelp-0:0.10-0.2.el4.src", "4ES:devhelp-0:0.10-0.2.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.2.el4.i386", "4ES:devhelp-devel-0:0.10-0.2.el4.ppc", "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64", "4ES:seamonkey-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-0:1.0.3-0.el4.1.src", "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4WS:devhelp-0:0.10-0.2.el4.i386", "4WS:devhelp-0:0.10-0.2.el4.ppc", "4WS:devhelp-0:0.10-0.2.el4.src", "4WS:devhelp-0:0.10-0.2.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.2.el4.i386", "4WS:devhelp-devel-0:0.10-0.2.el4.ppc", "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4WS:seamonkey-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-0:1.0.3-0.el4.1.src", "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2786" }, { "category": "external", "summary": "RHBZ#1618120", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618120" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2786", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2786" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2786", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2786" } ], "release_date": "2006-06-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-08-02T18:39:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nMultilib systems may experience difficulty if trying to specify the package\nby name to the Update Agent via a command line argument. This can be\nsolved by executing the following commands:\n\nup2date seamonkey; up2date seamonkey-nss seamonkey-nspr", "product_ids": [ "4AS:devhelp-0:0.10-0.2.el4.i386", "4AS:devhelp-0:0.10-0.2.el4.ppc", "4AS:devhelp-0:0.10-0.2.el4.src", "4AS:devhelp-0:0.10-0.2.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.2.el4.i386", "4AS:devhelp-devel-0:0.10-0.2.el4.ppc", "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4AS:seamonkey-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-0:1.0.3-0.el4.1.src", "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4Desktop:devhelp-0:0.10-0.2.el4.i386", "4Desktop:devhelp-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-0:0.10-0.2.el4.src", "4Desktop:devhelp-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-0:1.0.3-0.el4.1.src", "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4ES:devhelp-0:0.10-0.2.el4.i386", "4ES:devhelp-0:0.10-0.2.el4.ppc", "4ES:devhelp-0:0.10-0.2.el4.src", "4ES:devhelp-0:0.10-0.2.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.2.el4.i386", "4ES:devhelp-devel-0:0.10-0.2.el4.ppc", "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64", "4ES:seamonkey-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-0:1.0.3-0.el4.1.src", "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4WS:devhelp-0:0.10-0.2.el4.i386", "4WS:devhelp-0:0.10-0.2.el4.ppc", "4WS:devhelp-0:0.10-0.2.el4.src", "4WS:devhelp-0:0.10-0.2.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.2.el4.i386", "4WS:devhelp-devel-0:0.10-0.2.el4.ppc", "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4WS:seamonkey-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-0:1.0.3-0.el4.1.src", "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0609" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2006-2787", "discovery_date": "2006-05-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618121" } ], "notes": [ { "category": "description", "text": "EvalInSandbox in Mozilla Firefox and Thunderbird before 1.5.0.4 allows remote attackers to gain privileges via javascript that calls the valueOf method on objects that were created outside of the sandbox.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:devhelp-0:0.10-0.2.el4.i386", "4AS:devhelp-0:0.10-0.2.el4.ppc", "4AS:devhelp-0:0.10-0.2.el4.src", "4AS:devhelp-0:0.10-0.2.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.2.el4.i386", "4AS:devhelp-devel-0:0.10-0.2.el4.ppc", "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4AS:seamonkey-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-0:1.0.3-0.el4.1.src", "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4Desktop:devhelp-0:0.10-0.2.el4.i386", "4Desktop:devhelp-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-0:0.10-0.2.el4.src", "4Desktop:devhelp-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-0:1.0.3-0.el4.1.src", "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4ES:devhelp-0:0.10-0.2.el4.i386", "4ES:devhelp-0:0.10-0.2.el4.ppc", "4ES:devhelp-0:0.10-0.2.el4.src", "4ES:devhelp-0:0.10-0.2.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.2.el4.i386", "4ES:devhelp-devel-0:0.10-0.2.el4.ppc", "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64", "4ES:seamonkey-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-0:1.0.3-0.el4.1.src", "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4WS:devhelp-0:0.10-0.2.el4.i386", "4WS:devhelp-0:0.10-0.2.el4.ppc", "4WS:devhelp-0:0.10-0.2.el4.src", "4WS:devhelp-0:0.10-0.2.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.2.el4.i386", "4WS:devhelp-devel-0:0.10-0.2.el4.ppc", "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4WS:seamonkey-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-0:1.0.3-0.el4.1.src", "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2787" }, { "category": "external", "summary": "RHBZ#1618121", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618121" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2787", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2787" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2787", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2787" } ], "release_date": "2006-06-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-08-02T18:39:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nMultilib systems may experience difficulty if trying to specify the package\nby name to the Update Agent via a command line argument. This can be\nsolved by executing the following commands:\n\nup2date seamonkey; up2date seamonkey-nss seamonkey-nspr", "product_ids": [ "4AS:devhelp-0:0.10-0.2.el4.i386", "4AS:devhelp-0:0.10-0.2.el4.ppc", "4AS:devhelp-0:0.10-0.2.el4.src", "4AS:devhelp-0:0.10-0.2.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.2.el4.i386", "4AS:devhelp-devel-0:0.10-0.2.el4.ppc", "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4AS:seamonkey-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-0:1.0.3-0.el4.1.src", "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4Desktop:devhelp-0:0.10-0.2.el4.i386", "4Desktop:devhelp-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-0:0.10-0.2.el4.src", "4Desktop:devhelp-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-0:1.0.3-0.el4.1.src", "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4ES:devhelp-0:0.10-0.2.el4.i386", "4ES:devhelp-0:0.10-0.2.el4.ppc", "4ES:devhelp-0:0.10-0.2.el4.src", "4ES:devhelp-0:0.10-0.2.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.2.el4.i386", "4ES:devhelp-devel-0:0.10-0.2.el4.ppc", "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64", "4ES:seamonkey-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-0:1.0.3-0.el4.1.src", "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4WS:devhelp-0:0.10-0.2.el4.i386", "4WS:devhelp-0:0.10-0.2.el4.ppc", "4WS:devhelp-0:0.10-0.2.el4.src", "4WS:devhelp-0:0.10-0.2.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.2.el4.i386", "4WS:devhelp-devel-0:0.10-0.2.el4.ppc", "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4WS:seamonkey-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-0:1.0.3-0.el4.1.src", "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0609" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2006-2788", "discovery_date": "2006-05-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618122" } ], "notes": [ { "category": "description", "text": "Double free vulnerability in the getRawDER function for nsIX509Cert in Firefox allows remote attackers to cause a denial of service (hang) and possibly execute arbitrary code via certain Javascript code.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:devhelp-0:0.10-0.2.el4.i386", "4AS:devhelp-0:0.10-0.2.el4.ppc", "4AS:devhelp-0:0.10-0.2.el4.src", "4AS:devhelp-0:0.10-0.2.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.2.el4.i386", "4AS:devhelp-devel-0:0.10-0.2.el4.ppc", "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4AS:seamonkey-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-0:1.0.3-0.el4.1.src", "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4Desktop:devhelp-0:0.10-0.2.el4.i386", "4Desktop:devhelp-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-0:0.10-0.2.el4.src", "4Desktop:devhelp-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-0:1.0.3-0.el4.1.src", "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4ES:devhelp-0:0.10-0.2.el4.i386", "4ES:devhelp-0:0.10-0.2.el4.ppc", "4ES:devhelp-0:0.10-0.2.el4.src", "4ES:devhelp-0:0.10-0.2.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.2.el4.i386", "4ES:devhelp-devel-0:0.10-0.2.el4.ppc", "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64", "4ES:seamonkey-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-0:1.0.3-0.el4.1.src", "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4WS:devhelp-0:0.10-0.2.el4.i386", "4WS:devhelp-0:0.10-0.2.el4.ppc", "4WS:devhelp-0:0.10-0.2.el4.src", "4WS:devhelp-0:0.10-0.2.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.2.el4.i386", "4WS:devhelp-devel-0:0.10-0.2.el4.ppc", "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4WS:seamonkey-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-0:1.0.3-0.el4.1.src", "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2788" }, { "category": "external", "summary": "RHBZ#1618122", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618122" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2788", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2788" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2788", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2788" } ], "release_date": "2006-06-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-08-02T18:39:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nMultilib systems may experience difficulty if trying to specify the package\nby name to the Update Agent via a command line argument. This can be\nsolved by executing the following commands:\n\nup2date seamonkey; up2date seamonkey-nss seamonkey-nspr", "product_ids": [ "4AS:devhelp-0:0.10-0.2.el4.i386", "4AS:devhelp-0:0.10-0.2.el4.ppc", "4AS:devhelp-0:0.10-0.2.el4.src", "4AS:devhelp-0:0.10-0.2.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.2.el4.i386", "4AS:devhelp-devel-0:0.10-0.2.el4.ppc", "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4AS:seamonkey-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-0:1.0.3-0.el4.1.src", "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4Desktop:devhelp-0:0.10-0.2.el4.i386", "4Desktop:devhelp-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-0:0.10-0.2.el4.src", "4Desktop:devhelp-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-0:1.0.3-0.el4.1.src", "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4ES:devhelp-0:0.10-0.2.el4.i386", "4ES:devhelp-0:0.10-0.2.el4.ppc", "4ES:devhelp-0:0.10-0.2.el4.src", "4ES:devhelp-0:0.10-0.2.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.2.el4.i386", "4ES:devhelp-devel-0:0.10-0.2.el4.ppc", "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64", "4ES:seamonkey-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-0:1.0.3-0.el4.1.src", "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4WS:devhelp-0:0.10-0.2.el4.i386", "4WS:devhelp-0:0.10-0.2.el4.ppc", "4WS:devhelp-0:0.10-0.2.el4.src", "4WS:devhelp-0:0.10-0.2.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.2.el4.i386", "4WS:devhelp-devel-0:0.10-0.2.el4.ppc", "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4WS:seamonkey-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-0:1.0.3-0.el4.1.src", "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0609" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2006-3113", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618135" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox 1.5 before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via simultaneous XPCOM events, which causes a timer object to be deleted in a way that triggers memory corruption.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:devhelp-0:0.10-0.2.el4.i386", "4AS:devhelp-0:0.10-0.2.el4.ppc", "4AS:devhelp-0:0.10-0.2.el4.src", "4AS:devhelp-0:0.10-0.2.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.2.el4.i386", "4AS:devhelp-devel-0:0.10-0.2.el4.ppc", "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4AS:seamonkey-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-0:1.0.3-0.el4.1.src", "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4Desktop:devhelp-0:0.10-0.2.el4.i386", "4Desktop:devhelp-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-0:0.10-0.2.el4.src", "4Desktop:devhelp-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-0:1.0.3-0.el4.1.src", "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4ES:devhelp-0:0.10-0.2.el4.i386", "4ES:devhelp-0:0.10-0.2.el4.ppc", "4ES:devhelp-0:0.10-0.2.el4.src", "4ES:devhelp-0:0.10-0.2.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.2.el4.i386", "4ES:devhelp-devel-0:0.10-0.2.el4.ppc", "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64", "4ES:seamonkey-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-0:1.0.3-0.el4.1.src", "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4WS:devhelp-0:0.10-0.2.el4.i386", "4WS:devhelp-0:0.10-0.2.el4.ppc", "4WS:devhelp-0:0.10-0.2.el4.src", "4WS:devhelp-0:0.10-0.2.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.2.el4.i386", "4WS:devhelp-devel-0:0.10-0.2.el4.ppc", "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4WS:seamonkey-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-0:1.0.3-0.el4.1.src", "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3113" }, { "category": "external", "summary": "RHBZ#1618135", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618135" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3113", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3113" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3113", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3113" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-08-02T18:39:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nMultilib systems may experience difficulty if trying to specify the package\nby name to the Update Agent via a command line argument. This can be\nsolved by executing the following commands:\n\nup2date seamonkey; up2date seamonkey-nss seamonkey-nspr", "product_ids": [ "4AS:devhelp-0:0.10-0.2.el4.i386", "4AS:devhelp-0:0.10-0.2.el4.ppc", "4AS:devhelp-0:0.10-0.2.el4.src", "4AS:devhelp-0:0.10-0.2.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.2.el4.i386", "4AS:devhelp-devel-0:0.10-0.2.el4.ppc", "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4AS:seamonkey-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-0:1.0.3-0.el4.1.src", "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4Desktop:devhelp-0:0.10-0.2.el4.i386", "4Desktop:devhelp-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-0:0.10-0.2.el4.src", "4Desktop:devhelp-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-0:1.0.3-0.el4.1.src", "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4ES:devhelp-0:0.10-0.2.el4.i386", "4ES:devhelp-0:0.10-0.2.el4.ppc", "4ES:devhelp-0:0.10-0.2.el4.src", "4ES:devhelp-0:0.10-0.2.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.2.el4.i386", "4ES:devhelp-devel-0:0.10-0.2.el4.ppc", "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64", "4ES:seamonkey-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-0:1.0.3-0.el4.1.src", "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4WS:devhelp-0:0.10-0.2.el4.i386", "4WS:devhelp-0:0.10-0.2.el4.ppc", "4WS:devhelp-0:0.10-0.2.el4.src", "4WS:devhelp-0:0.10-0.2.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.2.el4.i386", "4WS:devhelp-devel-0:0.10-0.2.el4.ppc", "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4WS:seamonkey-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-0:1.0.3-0.el4.1.src", "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0609" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-3677", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618153" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox 1.5 before 1.5.0.5 and SeaMonkey before 1.0.3 allows remote attackers to execute arbitrary code by changing certain properties of the window navigator object (window.navigator) that are accessed when Java starts up, which causes a crash that leads to code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:devhelp-0:0.10-0.2.el4.i386", "4AS:devhelp-0:0.10-0.2.el4.ppc", "4AS:devhelp-0:0.10-0.2.el4.src", "4AS:devhelp-0:0.10-0.2.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.2.el4.i386", "4AS:devhelp-devel-0:0.10-0.2.el4.ppc", "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4AS:seamonkey-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-0:1.0.3-0.el4.1.src", "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4Desktop:devhelp-0:0.10-0.2.el4.i386", "4Desktop:devhelp-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-0:0.10-0.2.el4.src", "4Desktop:devhelp-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-0:1.0.3-0.el4.1.src", "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4ES:devhelp-0:0.10-0.2.el4.i386", "4ES:devhelp-0:0.10-0.2.el4.ppc", "4ES:devhelp-0:0.10-0.2.el4.src", "4ES:devhelp-0:0.10-0.2.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.2.el4.i386", "4ES:devhelp-devel-0:0.10-0.2.el4.ppc", "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64", "4ES:seamonkey-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-0:1.0.3-0.el4.1.src", "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4WS:devhelp-0:0.10-0.2.el4.i386", "4WS:devhelp-0:0.10-0.2.el4.ppc", "4WS:devhelp-0:0.10-0.2.el4.src", "4WS:devhelp-0:0.10-0.2.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.2.el4.i386", "4WS:devhelp-devel-0:0.10-0.2.el4.ppc", "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4WS:seamonkey-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-0:1.0.3-0.el4.1.src", "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3677" }, { "category": "external", "summary": "RHBZ#1618153", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618153" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3677", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3677" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3677", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3677" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-08-02T18:39:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nMultilib systems may experience difficulty if trying to specify the package\nby name to the Update Agent via a command line argument. This can be\nsolved by executing the following commands:\n\nup2date seamonkey; up2date seamonkey-nss seamonkey-nspr", "product_ids": [ "4AS:devhelp-0:0.10-0.2.el4.i386", "4AS:devhelp-0:0.10-0.2.el4.ppc", "4AS:devhelp-0:0.10-0.2.el4.src", "4AS:devhelp-0:0.10-0.2.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.2.el4.i386", "4AS:devhelp-devel-0:0.10-0.2.el4.ppc", "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4AS:seamonkey-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-0:1.0.3-0.el4.1.src", "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4Desktop:devhelp-0:0.10-0.2.el4.i386", "4Desktop:devhelp-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-0:0.10-0.2.el4.src", "4Desktop:devhelp-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-0:1.0.3-0.el4.1.src", "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4ES:devhelp-0:0.10-0.2.el4.i386", "4ES:devhelp-0:0.10-0.2.el4.ppc", "4ES:devhelp-0:0.10-0.2.el4.src", "4ES:devhelp-0:0.10-0.2.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.2.el4.i386", "4ES:devhelp-devel-0:0.10-0.2.el4.ppc", "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64", "4ES:seamonkey-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-0:1.0.3-0.el4.1.src", "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4WS:devhelp-0:0.10-0.2.el4.i386", "4WS:devhelp-0:0.10-0.2.el4.ppc", "4WS:devhelp-0:0.10-0.2.el4.src", "4WS:devhelp-0:0.10-0.2.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.2.el4.i386", "4WS:devhelp-devel-0:0.10-0.2.el4.ppc", "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4WS:seamonkey-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-0:1.0.3-0.el4.1.src", "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0609" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-3801", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618161" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox 1.5 before 1.5.0.5 and SeaMonkey before 1.0.3 does not properly clear a JavaScript reference to a frame or window, which leaves a pointer to a deleted object that allows remote attackers to execute arbitrary native code.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:devhelp-0:0.10-0.2.el4.i386", "4AS:devhelp-0:0.10-0.2.el4.ppc", "4AS:devhelp-0:0.10-0.2.el4.src", "4AS:devhelp-0:0.10-0.2.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.2.el4.i386", "4AS:devhelp-devel-0:0.10-0.2.el4.ppc", "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4AS:seamonkey-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-0:1.0.3-0.el4.1.src", "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4Desktop:devhelp-0:0.10-0.2.el4.i386", "4Desktop:devhelp-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-0:0.10-0.2.el4.src", "4Desktop:devhelp-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-0:1.0.3-0.el4.1.src", "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4ES:devhelp-0:0.10-0.2.el4.i386", "4ES:devhelp-0:0.10-0.2.el4.ppc", "4ES:devhelp-0:0.10-0.2.el4.src", "4ES:devhelp-0:0.10-0.2.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.2.el4.i386", "4ES:devhelp-devel-0:0.10-0.2.el4.ppc", "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64", "4ES:seamonkey-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-0:1.0.3-0.el4.1.src", "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4WS:devhelp-0:0.10-0.2.el4.i386", "4WS:devhelp-0:0.10-0.2.el4.ppc", "4WS:devhelp-0:0.10-0.2.el4.src", "4WS:devhelp-0:0.10-0.2.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.2.el4.i386", "4WS:devhelp-devel-0:0.10-0.2.el4.ppc", "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4WS:seamonkey-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-0:1.0.3-0.el4.1.src", "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3801" }, { "category": "external", "summary": "RHBZ#1618161", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618161" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3801", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3801" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3801", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3801" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-08-02T18:39:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nMultilib systems may experience difficulty if trying to specify the package\nby name to the Update Agent via a command line argument. This can be\nsolved by executing the following commands:\n\nup2date seamonkey; up2date seamonkey-nss seamonkey-nspr", "product_ids": [ "4AS:devhelp-0:0.10-0.2.el4.i386", "4AS:devhelp-0:0.10-0.2.el4.ppc", "4AS:devhelp-0:0.10-0.2.el4.src", "4AS:devhelp-0:0.10-0.2.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.2.el4.i386", "4AS:devhelp-devel-0:0.10-0.2.el4.ppc", "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4AS:seamonkey-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-0:1.0.3-0.el4.1.src", "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4Desktop:devhelp-0:0.10-0.2.el4.i386", "4Desktop:devhelp-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-0:0.10-0.2.el4.src", "4Desktop:devhelp-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-0:1.0.3-0.el4.1.src", "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4ES:devhelp-0:0.10-0.2.el4.i386", "4ES:devhelp-0:0.10-0.2.el4.ppc", "4ES:devhelp-0:0.10-0.2.el4.src", "4ES:devhelp-0:0.10-0.2.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.2.el4.i386", "4ES:devhelp-devel-0:0.10-0.2.el4.ppc", "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64", "4ES:seamonkey-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-0:1.0.3-0.el4.1.src", "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4WS:devhelp-0:0.10-0.2.el4.i386", "4WS:devhelp-0:0.10-0.2.el4.ppc", "4WS:devhelp-0:0.10-0.2.el4.src", "4WS:devhelp-0:0.10-0.2.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.2.el4.i386", "4WS:devhelp-devel-0:0.10-0.2.el4.ppc", "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4WS:seamonkey-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-0:1.0.3-0.el4.1.src", "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0609" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-3802", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618162" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to hijack native DOM methods from objects in another domain and conduct cross-site scripting (XSS) attacks using DOM methods of the top-level object.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:devhelp-0:0.10-0.2.el4.i386", "4AS:devhelp-0:0.10-0.2.el4.ppc", "4AS:devhelp-0:0.10-0.2.el4.src", "4AS:devhelp-0:0.10-0.2.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.2.el4.i386", "4AS:devhelp-devel-0:0.10-0.2.el4.ppc", "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4AS:seamonkey-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-0:1.0.3-0.el4.1.src", "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4Desktop:devhelp-0:0.10-0.2.el4.i386", "4Desktop:devhelp-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-0:0.10-0.2.el4.src", "4Desktop:devhelp-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-0:1.0.3-0.el4.1.src", "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4ES:devhelp-0:0.10-0.2.el4.i386", "4ES:devhelp-0:0.10-0.2.el4.ppc", "4ES:devhelp-0:0.10-0.2.el4.src", "4ES:devhelp-0:0.10-0.2.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.2.el4.i386", "4ES:devhelp-devel-0:0.10-0.2.el4.ppc", "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64", "4ES:seamonkey-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-0:1.0.3-0.el4.1.src", "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4WS:devhelp-0:0.10-0.2.el4.i386", "4WS:devhelp-0:0.10-0.2.el4.ppc", "4WS:devhelp-0:0.10-0.2.el4.src", "4WS:devhelp-0:0.10-0.2.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.2.el4.i386", "4WS:devhelp-devel-0:0.10-0.2.el4.ppc", "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4WS:seamonkey-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-0:1.0.3-0.el4.1.src", "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3802" }, { "category": "external", "summary": "RHBZ#1618162", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618162" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3802", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3802" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3802", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3802" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-08-02T18:39:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nMultilib systems may experience difficulty if trying to specify the package\nby name to the Update Agent via a command line argument. This can be\nsolved by executing the following commands:\n\nup2date seamonkey; up2date seamonkey-nss seamonkey-nspr", "product_ids": [ "4AS:devhelp-0:0.10-0.2.el4.i386", "4AS:devhelp-0:0.10-0.2.el4.ppc", "4AS:devhelp-0:0.10-0.2.el4.src", "4AS:devhelp-0:0.10-0.2.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.2.el4.i386", "4AS:devhelp-devel-0:0.10-0.2.el4.ppc", "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4AS:seamonkey-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-0:1.0.3-0.el4.1.src", "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4Desktop:devhelp-0:0.10-0.2.el4.i386", "4Desktop:devhelp-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-0:0.10-0.2.el4.src", "4Desktop:devhelp-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-0:1.0.3-0.el4.1.src", "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4ES:devhelp-0:0.10-0.2.el4.i386", "4ES:devhelp-0:0.10-0.2.el4.ppc", "4ES:devhelp-0:0.10-0.2.el4.src", "4ES:devhelp-0:0.10-0.2.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.2.el4.i386", "4ES:devhelp-devel-0:0.10-0.2.el4.ppc", "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64", "4ES:seamonkey-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-0:1.0.3-0.el4.1.src", "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4WS:devhelp-0:0.10-0.2.el4.i386", "4WS:devhelp-0:0.10-0.2.el4.ppc", "4WS:devhelp-0:0.10-0.2.el4.src", "4WS:devhelp-0:0.10-0.2.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.2.el4.i386", "4WS:devhelp-devel-0:0.10-0.2.el4.ppc", "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4WS:seamonkey-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-0:1.0.3-0.el4.1.src", "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0609" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2006-3803", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618163" } ], "notes": [ { "category": "description", "text": "Race condition in the JavaScript garbage collection in Mozilla Firefox 1.5 before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 might allow remote attackers to execute arbitrary code by causing the garbage collector to delete a temporary variable while it is still being used during the creation of a new Function object.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:devhelp-0:0.10-0.2.el4.i386", "4AS:devhelp-0:0.10-0.2.el4.ppc", "4AS:devhelp-0:0.10-0.2.el4.src", "4AS:devhelp-0:0.10-0.2.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.2.el4.i386", "4AS:devhelp-devel-0:0.10-0.2.el4.ppc", "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4AS:seamonkey-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-0:1.0.3-0.el4.1.src", "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4Desktop:devhelp-0:0.10-0.2.el4.i386", "4Desktop:devhelp-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-0:0.10-0.2.el4.src", "4Desktop:devhelp-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-0:1.0.3-0.el4.1.src", "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4ES:devhelp-0:0.10-0.2.el4.i386", "4ES:devhelp-0:0.10-0.2.el4.ppc", "4ES:devhelp-0:0.10-0.2.el4.src", "4ES:devhelp-0:0.10-0.2.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.2.el4.i386", "4ES:devhelp-devel-0:0.10-0.2.el4.ppc", "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64", "4ES:seamonkey-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-0:1.0.3-0.el4.1.src", "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4WS:devhelp-0:0.10-0.2.el4.i386", "4WS:devhelp-0:0.10-0.2.el4.ppc", "4WS:devhelp-0:0.10-0.2.el4.src", "4WS:devhelp-0:0.10-0.2.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.2.el4.i386", "4WS:devhelp-devel-0:0.10-0.2.el4.ppc", "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4WS:seamonkey-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-0:1.0.3-0.el4.1.src", "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3803" }, { "category": "external", "summary": "RHBZ#1618163", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618163" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3803", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3803" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3803", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3803" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-08-02T18:39:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nMultilib systems may experience difficulty if trying to specify the package\nby name to the Update Agent via a command line argument. This can be\nsolved by executing the following commands:\n\nup2date seamonkey; up2date seamonkey-nss seamonkey-nspr", "product_ids": [ "4AS:devhelp-0:0.10-0.2.el4.i386", "4AS:devhelp-0:0.10-0.2.el4.ppc", "4AS:devhelp-0:0.10-0.2.el4.src", "4AS:devhelp-0:0.10-0.2.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.2.el4.i386", "4AS:devhelp-devel-0:0.10-0.2.el4.ppc", "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4AS:seamonkey-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-0:1.0.3-0.el4.1.src", "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4Desktop:devhelp-0:0.10-0.2.el4.i386", "4Desktop:devhelp-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-0:0.10-0.2.el4.src", "4Desktop:devhelp-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-0:1.0.3-0.el4.1.src", "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4ES:devhelp-0:0.10-0.2.el4.i386", "4ES:devhelp-0:0.10-0.2.el4.ppc", "4ES:devhelp-0:0.10-0.2.el4.src", "4ES:devhelp-0:0.10-0.2.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.2.el4.i386", "4ES:devhelp-devel-0:0.10-0.2.el4.ppc", "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64", "4ES:seamonkey-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-0:1.0.3-0.el4.1.src", "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4WS:devhelp-0:0.10-0.2.el4.i386", "4WS:devhelp-0:0.10-0.2.el4.ppc", "4WS:devhelp-0:0.10-0.2.el4.src", "4WS:devhelp-0:0.10-0.2.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.2.el4.i386", "4WS:devhelp-devel-0:0.10-0.2.el4.ppc", "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4WS:seamonkey-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-0:1.0.3-0.el4.1.src", "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0609" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-3804", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618164" } ], "notes": [ { "category": "description", "text": "Heap-based buffer overflow in Mozilla Thunderbird before 1.5.0.5 and SeaMonkey before 1.0.3 allows remote attackers to cause a denial of service (crash) via a VCard attachment with a malformed base64 field, which copies more data than expected due to an integer underflow.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:devhelp-0:0.10-0.2.el4.i386", "4AS:devhelp-0:0.10-0.2.el4.ppc", "4AS:devhelp-0:0.10-0.2.el4.src", "4AS:devhelp-0:0.10-0.2.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.2.el4.i386", "4AS:devhelp-devel-0:0.10-0.2.el4.ppc", "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4AS:seamonkey-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-0:1.0.3-0.el4.1.src", "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4Desktop:devhelp-0:0.10-0.2.el4.i386", "4Desktop:devhelp-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-0:0.10-0.2.el4.src", "4Desktop:devhelp-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-0:1.0.3-0.el4.1.src", "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4ES:devhelp-0:0.10-0.2.el4.i386", "4ES:devhelp-0:0.10-0.2.el4.ppc", "4ES:devhelp-0:0.10-0.2.el4.src", "4ES:devhelp-0:0.10-0.2.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.2.el4.i386", "4ES:devhelp-devel-0:0.10-0.2.el4.ppc", "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64", "4ES:seamonkey-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-0:1.0.3-0.el4.1.src", "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4WS:devhelp-0:0.10-0.2.el4.i386", "4WS:devhelp-0:0.10-0.2.el4.ppc", "4WS:devhelp-0:0.10-0.2.el4.src", "4WS:devhelp-0:0.10-0.2.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.2.el4.i386", "4WS:devhelp-devel-0:0.10-0.2.el4.ppc", "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4WS:seamonkey-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-0:1.0.3-0.el4.1.src", "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3804" }, { "category": "external", "summary": "RHBZ#1618164", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618164" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3804", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3804" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3804", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3804" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-08-02T18:39:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nMultilib systems may experience difficulty if trying to specify the package\nby name to the Update Agent via a command line argument. This can be\nsolved by executing the following commands:\n\nup2date seamonkey; up2date seamonkey-nss seamonkey-nspr", "product_ids": [ "4AS:devhelp-0:0.10-0.2.el4.i386", "4AS:devhelp-0:0.10-0.2.el4.ppc", "4AS:devhelp-0:0.10-0.2.el4.src", "4AS:devhelp-0:0.10-0.2.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.2.el4.i386", "4AS:devhelp-devel-0:0.10-0.2.el4.ppc", "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4AS:seamonkey-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-0:1.0.3-0.el4.1.src", "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4Desktop:devhelp-0:0.10-0.2.el4.i386", "4Desktop:devhelp-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-0:0.10-0.2.el4.src", "4Desktop:devhelp-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-0:1.0.3-0.el4.1.src", "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4ES:devhelp-0:0.10-0.2.el4.i386", "4ES:devhelp-0:0.10-0.2.el4.ppc", "4ES:devhelp-0:0.10-0.2.el4.src", "4ES:devhelp-0:0.10-0.2.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.2.el4.i386", "4ES:devhelp-devel-0:0.10-0.2.el4.ppc", "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64", "4ES:seamonkey-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-0:1.0.3-0.el4.1.src", "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4WS:devhelp-0:0.10-0.2.el4.i386", "4WS:devhelp-0:0.10-0.2.el4.ppc", "4WS:devhelp-0:0.10-0.2.el4.src", "4WS:devhelp-0:0.10-0.2.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.2.el4.i386", "4WS:devhelp-devel-0:0.10-0.2.el4.ppc", "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4WS:seamonkey-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-0:1.0.3-0.el4.1.src", "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0609" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-3805", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618165" } ], "notes": [ { "category": "description", "text": "The Javascript engine in Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 might allow remote attackers to execute arbitrary code via vectors involving garbage collection that causes deletion of a temporary object that is still being used.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:devhelp-0:0.10-0.2.el4.i386", "4AS:devhelp-0:0.10-0.2.el4.ppc", "4AS:devhelp-0:0.10-0.2.el4.src", "4AS:devhelp-0:0.10-0.2.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.2.el4.i386", "4AS:devhelp-devel-0:0.10-0.2.el4.ppc", "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4AS:seamonkey-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-0:1.0.3-0.el4.1.src", "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4Desktop:devhelp-0:0.10-0.2.el4.i386", "4Desktop:devhelp-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-0:0.10-0.2.el4.src", "4Desktop:devhelp-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-0:1.0.3-0.el4.1.src", "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4ES:devhelp-0:0.10-0.2.el4.i386", "4ES:devhelp-0:0.10-0.2.el4.ppc", "4ES:devhelp-0:0.10-0.2.el4.src", "4ES:devhelp-0:0.10-0.2.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.2.el4.i386", "4ES:devhelp-devel-0:0.10-0.2.el4.ppc", "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64", "4ES:seamonkey-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-0:1.0.3-0.el4.1.src", "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4WS:devhelp-0:0.10-0.2.el4.i386", "4WS:devhelp-0:0.10-0.2.el4.ppc", "4WS:devhelp-0:0.10-0.2.el4.src", "4WS:devhelp-0:0.10-0.2.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.2.el4.i386", "4WS:devhelp-devel-0:0.10-0.2.el4.ppc", "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4WS:seamonkey-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-0:1.0.3-0.el4.1.src", "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3805" }, { "category": "external", "summary": "RHBZ#1618165", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618165" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3805", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3805" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3805", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3805" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-08-02T18:39:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nMultilib systems may experience difficulty if trying to specify the package\nby name to the Update Agent via a command line argument. This can be\nsolved by executing the following commands:\n\nup2date seamonkey; up2date seamonkey-nss seamonkey-nspr", "product_ids": [ "4AS:devhelp-0:0.10-0.2.el4.i386", "4AS:devhelp-0:0.10-0.2.el4.ppc", "4AS:devhelp-0:0.10-0.2.el4.src", "4AS:devhelp-0:0.10-0.2.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.2.el4.i386", "4AS:devhelp-devel-0:0.10-0.2.el4.ppc", "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4AS:seamonkey-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-0:1.0.3-0.el4.1.src", "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4Desktop:devhelp-0:0.10-0.2.el4.i386", "4Desktop:devhelp-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-0:0.10-0.2.el4.src", "4Desktop:devhelp-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-0:1.0.3-0.el4.1.src", "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4ES:devhelp-0:0.10-0.2.el4.i386", "4ES:devhelp-0:0.10-0.2.el4.ppc", "4ES:devhelp-0:0.10-0.2.el4.src", "4ES:devhelp-0:0.10-0.2.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.2.el4.i386", "4ES:devhelp-devel-0:0.10-0.2.el4.ppc", "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64", "4ES:seamonkey-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-0:1.0.3-0.el4.1.src", "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4WS:devhelp-0:0.10-0.2.el4.i386", "4WS:devhelp-0:0.10-0.2.el4.ppc", "4WS:devhelp-0:0.10-0.2.el4.src", "4WS:devhelp-0:0.10-0.2.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.2.el4.i386", "4WS:devhelp-devel-0:0.10-0.2.el4.ppc", "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4WS:seamonkey-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-0:1.0.3-0.el4.1.src", "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0609" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-3806", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618166" } ], "notes": [ { "category": "description", "text": "Multiple integer overflows in the Javascript engine in Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 might allow remote attackers to execute arbitrary code via vectors involving (1) long strings in the toSource method of the Object, Array, and String objects; and (2) unspecified \"string function arguments.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:devhelp-0:0.10-0.2.el4.i386", "4AS:devhelp-0:0.10-0.2.el4.ppc", "4AS:devhelp-0:0.10-0.2.el4.src", "4AS:devhelp-0:0.10-0.2.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.2.el4.i386", "4AS:devhelp-devel-0:0.10-0.2.el4.ppc", "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4AS:seamonkey-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-0:1.0.3-0.el4.1.src", "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4Desktop:devhelp-0:0.10-0.2.el4.i386", "4Desktop:devhelp-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-0:0.10-0.2.el4.src", "4Desktop:devhelp-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-0:1.0.3-0.el4.1.src", "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4ES:devhelp-0:0.10-0.2.el4.i386", "4ES:devhelp-0:0.10-0.2.el4.ppc", "4ES:devhelp-0:0.10-0.2.el4.src", "4ES:devhelp-0:0.10-0.2.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.2.el4.i386", "4ES:devhelp-devel-0:0.10-0.2.el4.ppc", "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64", "4ES:seamonkey-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-0:1.0.3-0.el4.1.src", "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4WS:devhelp-0:0.10-0.2.el4.i386", "4WS:devhelp-0:0.10-0.2.el4.ppc", "4WS:devhelp-0:0.10-0.2.el4.src", "4WS:devhelp-0:0.10-0.2.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.2.el4.i386", "4WS:devhelp-devel-0:0.10-0.2.el4.ppc", "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4WS:seamonkey-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-0:1.0.3-0.el4.1.src", "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3806" }, { "category": "external", "summary": "RHBZ#1618166", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618166" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3806", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3806" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3806", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3806" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-08-02T18:39:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nMultilib systems may experience difficulty if trying to specify the package\nby name to the Update Agent via a command line argument. This can be\nsolved by executing the following commands:\n\nup2date seamonkey; up2date seamonkey-nss seamonkey-nspr", "product_ids": [ "4AS:devhelp-0:0.10-0.2.el4.i386", "4AS:devhelp-0:0.10-0.2.el4.ppc", "4AS:devhelp-0:0.10-0.2.el4.src", "4AS:devhelp-0:0.10-0.2.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.2.el4.i386", "4AS:devhelp-devel-0:0.10-0.2.el4.ppc", "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4AS:seamonkey-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-0:1.0.3-0.el4.1.src", "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4Desktop:devhelp-0:0.10-0.2.el4.i386", "4Desktop:devhelp-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-0:0.10-0.2.el4.src", "4Desktop:devhelp-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-0:1.0.3-0.el4.1.src", "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4ES:devhelp-0:0.10-0.2.el4.i386", "4ES:devhelp-0:0.10-0.2.el4.ppc", "4ES:devhelp-0:0.10-0.2.el4.src", "4ES:devhelp-0:0.10-0.2.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.2.el4.i386", "4ES:devhelp-devel-0:0.10-0.2.el4.ppc", "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64", "4ES:seamonkey-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-0:1.0.3-0.el4.1.src", "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4WS:devhelp-0:0.10-0.2.el4.i386", "4WS:devhelp-0:0.10-0.2.el4.ppc", "4WS:devhelp-0:0.10-0.2.el4.src", "4WS:devhelp-0:0.10-0.2.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.2.el4.i386", "4WS:devhelp-devel-0:0.10-0.2.el4.ppc", "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4WS:seamonkey-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-0:1.0.3-0.el4.1.src", "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0609" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-3807", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618167" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to execute arbitrary code via script that changes the standard Object() constructor to return a reference to a privileged object and calling \"named JavaScript functions\" that use the constructor.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:devhelp-0:0.10-0.2.el4.i386", "4AS:devhelp-0:0.10-0.2.el4.ppc", "4AS:devhelp-0:0.10-0.2.el4.src", "4AS:devhelp-0:0.10-0.2.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.2.el4.i386", "4AS:devhelp-devel-0:0.10-0.2.el4.ppc", "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4AS:seamonkey-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-0:1.0.3-0.el4.1.src", "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4Desktop:devhelp-0:0.10-0.2.el4.i386", "4Desktop:devhelp-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-0:0.10-0.2.el4.src", "4Desktop:devhelp-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-0:1.0.3-0.el4.1.src", "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4ES:devhelp-0:0.10-0.2.el4.i386", "4ES:devhelp-0:0.10-0.2.el4.ppc", "4ES:devhelp-0:0.10-0.2.el4.src", "4ES:devhelp-0:0.10-0.2.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.2.el4.i386", "4ES:devhelp-devel-0:0.10-0.2.el4.ppc", "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64", "4ES:seamonkey-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-0:1.0.3-0.el4.1.src", "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4WS:devhelp-0:0.10-0.2.el4.i386", "4WS:devhelp-0:0.10-0.2.el4.ppc", "4WS:devhelp-0:0.10-0.2.el4.src", "4WS:devhelp-0:0.10-0.2.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.2.el4.i386", "4WS:devhelp-devel-0:0.10-0.2.el4.ppc", "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4WS:seamonkey-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-0:1.0.3-0.el4.1.src", "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3807" }, { "category": "external", "summary": "RHBZ#1618167", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618167" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3807", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3807" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3807", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3807" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-08-02T18:39:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nMultilib systems may experience difficulty if trying to specify the package\nby name to the Update Agent via a command line argument. This can be\nsolved by executing the following commands:\n\nup2date seamonkey; up2date seamonkey-nss seamonkey-nspr", "product_ids": [ "4AS:devhelp-0:0.10-0.2.el4.i386", "4AS:devhelp-0:0.10-0.2.el4.ppc", "4AS:devhelp-0:0.10-0.2.el4.src", "4AS:devhelp-0:0.10-0.2.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.2.el4.i386", "4AS:devhelp-devel-0:0.10-0.2.el4.ppc", "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4AS:seamonkey-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-0:1.0.3-0.el4.1.src", "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4Desktop:devhelp-0:0.10-0.2.el4.i386", "4Desktop:devhelp-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-0:0.10-0.2.el4.src", "4Desktop:devhelp-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-0:1.0.3-0.el4.1.src", "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4ES:devhelp-0:0.10-0.2.el4.i386", "4ES:devhelp-0:0.10-0.2.el4.ppc", "4ES:devhelp-0:0.10-0.2.el4.src", "4ES:devhelp-0:0.10-0.2.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.2.el4.i386", "4ES:devhelp-devel-0:0.10-0.2.el4.ppc", "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64", "4ES:seamonkey-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-0:1.0.3-0.el4.1.src", "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4WS:devhelp-0:0.10-0.2.el4.i386", "4WS:devhelp-0:0.10-0.2.el4.ppc", "4WS:devhelp-0:0.10-0.2.el4.src", "4WS:devhelp-0:0.10-0.2.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.2.el4.i386", "4WS:devhelp-devel-0:0.10-0.2.el4.ppc", "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4WS:seamonkey-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-0:1.0.3-0.el4.1.src", "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0609" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-3808", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618168" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox before 1.5.0.5 and SeaMonkey before 1.0.3 allows remote Proxy AutoConfig (PAC) servers to execute code with elevated privileges via a PAC script that sets the FindProxyForURL function to an eval method on a privileged object.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:devhelp-0:0.10-0.2.el4.i386", "4AS:devhelp-0:0.10-0.2.el4.ppc", "4AS:devhelp-0:0.10-0.2.el4.src", "4AS:devhelp-0:0.10-0.2.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.2.el4.i386", "4AS:devhelp-devel-0:0.10-0.2.el4.ppc", "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4AS:seamonkey-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-0:1.0.3-0.el4.1.src", "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4Desktop:devhelp-0:0.10-0.2.el4.i386", "4Desktop:devhelp-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-0:0.10-0.2.el4.src", "4Desktop:devhelp-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-0:1.0.3-0.el4.1.src", "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4ES:devhelp-0:0.10-0.2.el4.i386", "4ES:devhelp-0:0.10-0.2.el4.ppc", "4ES:devhelp-0:0.10-0.2.el4.src", "4ES:devhelp-0:0.10-0.2.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.2.el4.i386", "4ES:devhelp-devel-0:0.10-0.2.el4.ppc", "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64", "4ES:seamonkey-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-0:1.0.3-0.el4.1.src", "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4WS:devhelp-0:0.10-0.2.el4.i386", "4WS:devhelp-0:0.10-0.2.el4.ppc", "4WS:devhelp-0:0.10-0.2.el4.src", "4WS:devhelp-0:0.10-0.2.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.2.el4.i386", "4WS:devhelp-devel-0:0.10-0.2.el4.ppc", "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4WS:seamonkey-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-0:1.0.3-0.el4.1.src", "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3808" }, { "category": "external", "summary": "RHBZ#1618168", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618168" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3808", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3808" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3808", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3808" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-08-02T18:39:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nMultilib systems may experience difficulty if trying to specify the package\nby name to the Update Agent via a command line argument. This can be\nsolved by executing the following commands:\n\nup2date seamonkey; up2date seamonkey-nss seamonkey-nspr", "product_ids": [ "4AS:devhelp-0:0.10-0.2.el4.i386", "4AS:devhelp-0:0.10-0.2.el4.ppc", "4AS:devhelp-0:0.10-0.2.el4.src", "4AS:devhelp-0:0.10-0.2.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.2.el4.i386", "4AS:devhelp-devel-0:0.10-0.2.el4.ppc", "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4AS:seamonkey-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-0:1.0.3-0.el4.1.src", "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4Desktop:devhelp-0:0.10-0.2.el4.i386", "4Desktop:devhelp-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-0:0.10-0.2.el4.src", "4Desktop:devhelp-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-0:1.0.3-0.el4.1.src", "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4ES:devhelp-0:0.10-0.2.el4.i386", "4ES:devhelp-0:0.10-0.2.el4.ppc", "4ES:devhelp-0:0.10-0.2.el4.src", "4ES:devhelp-0:0.10-0.2.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.2.el4.i386", "4ES:devhelp-devel-0:0.10-0.2.el4.ppc", "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64", "4ES:seamonkey-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-0:1.0.3-0.el4.1.src", "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4WS:devhelp-0:0.10-0.2.el4.i386", "4WS:devhelp-0:0.10-0.2.el4.ppc", "4WS:devhelp-0:0.10-0.2.el4.src", "4WS:devhelp-0:0.10-0.2.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.2.el4.i386", "4WS:devhelp-devel-0:0.10-0.2.el4.ppc", "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4WS:seamonkey-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-0:1.0.3-0.el4.1.src", "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0609" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2006-3809", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618169" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows scripts with the UniversalBrowserRead privilege to gain UniversalXPConnect privileges and possibly execute code or obtain sensitive data by reading into a privileged context.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:devhelp-0:0.10-0.2.el4.i386", "4AS:devhelp-0:0.10-0.2.el4.ppc", "4AS:devhelp-0:0.10-0.2.el4.src", "4AS:devhelp-0:0.10-0.2.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.2.el4.i386", "4AS:devhelp-devel-0:0.10-0.2.el4.ppc", "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4AS:seamonkey-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-0:1.0.3-0.el4.1.src", "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4Desktop:devhelp-0:0.10-0.2.el4.i386", "4Desktop:devhelp-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-0:0.10-0.2.el4.src", "4Desktop:devhelp-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-0:1.0.3-0.el4.1.src", "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4ES:devhelp-0:0.10-0.2.el4.i386", "4ES:devhelp-0:0.10-0.2.el4.ppc", "4ES:devhelp-0:0.10-0.2.el4.src", "4ES:devhelp-0:0.10-0.2.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.2.el4.i386", "4ES:devhelp-devel-0:0.10-0.2.el4.ppc", "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64", "4ES:seamonkey-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-0:1.0.3-0.el4.1.src", "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4WS:devhelp-0:0.10-0.2.el4.i386", "4WS:devhelp-0:0.10-0.2.el4.ppc", "4WS:devhelp-0:0.10-0.2.el4.src", "4WS:devhelp-0:0.10-0.2.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.2.el4.i386", "4WS:devhelp-devel-0:0.10-0.2.el4.ppc", "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4WS:seamonkey-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-0:1.0.3-0.el4.1.src", "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3809" }, { "category": "external", "summary": "RHBZ#1618169", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618169" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3809", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3809" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3809", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3809" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-08-02T18:39:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nMultilib systems may experience difficulty if trying to specify the package\nby name to the Update Agent via a command line argument. This can be\nsolved by executing the following commands:\n\nup2date seamonkey; up2date seamonkey-nss seamonkey-nspr", "product_ids": [ "4AS:devhelp-0:0.10-0.2.el4.i386", "4AS:devhelp-0:0.10-0.2.el4.ppc", "4AS:devhelp-0:0.10-0.2.el4.src", "4AS:devhelp-0:0.10-0.2.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.2.el4.i386", "4AS:devhelp-devel-0:0.10-0.2.el4.ppc", "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4AS:seamonkey-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-0:1.0.3-0.el4.1.src", "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4Desktop:devhelp-0:0.10-0.2.el4.i386", "4Desktop:devhelp-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-0:0.10-0.2.el4.src", "4Desktop:devhelp-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-0:1.0.3-0.el4.1.src", "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4ES:devhelp-0:0.10-0.2.el4.i386", "4ES:devhelp-0:0.10-0.2.el4.ppc", "4ES:devhelp-0:0.10-0.2.el4.src", "4ES:devhelp-0:0.10-0.2.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.2.el4.i386", "4ES:devhelp-devel-0:0.10-0.2.el4.ppc", "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64", "4ES:seamonkey-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-0:1.0.3-0.el4.1.src", "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4WS:devhelp-0:0.10-0.2.el4.i386", "4WS:devhelp-0:0.10-0.2.el4.ppc", "4WS:devhelp-0:0.10-0.2.el4.src", "4WS:devhelp-0:0.10-0.2.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.2.el4.i386", "4WS:devhelp-devel-0:0.10-0.2.el4.ppc", "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4WS:seamonkey-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-0:1.0.3-0.el4.1.src", "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0609" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-3810", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618170" } ], "notes": [ { "category": "description", "text": "Cross-site scripting (XSS) vulnerability in Mozilla Firefox 1.5 before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to inject arbitrary web script or HTML via the XPCNativeWrapper(window).Function construct.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:devhelp-0:0.10-0.2.el4.i386", "4AS:devhelp-0:0.10-0.2.el4.ppc", "4AS:devhelp-0:0.10-0.2.el4.src", "4AS:devhelp-0:0.10-0.2.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.2.el4.i386", "4AS:devhelp-devel-0:0.10-0.2.el4.ppc", "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4AS:seamonkey-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-0:1.0.3-0.el4.1.src", "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4Desktop:devhelp-0:0.10-0.2.el4.i386", "4Desktop:devhelp-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-0:0.10-0.2.el4.src", "4Desktop:devhelp-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-0:1.0.3-0.el4.1.src", "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4ES:devhelp-0:0.10-0.2.el4.i386", "4ES:devhelp-0:0.10-0.2.el4.ppc", "4ES:devhelp-0:0.10-0.2.el4.src", "4ES:devhelp-0:0.10-0.2.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.2.el4.i386", "4ES:devhelp-devel-0:0.10-0.2.el4.ppc", "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64", "4ES:seamonkey-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-0:1.0.3-0.el4.1.src", "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4WS:devhelp-0:0.10-0.2.el4.i386", "4WS:devhelp-0:0.10-0.2.el4.ppc", "4WS:devhelp-0:0.10-0.2.el4.src", "4WS:devhelp-0:0.10-0.2.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.2.el4.i386", "4WS:devhelp-devel-0:0.10-0.2.el4.ppc", "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4WS:seamonkey-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-0:1.0.3-0.el4.1.src", "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3810" }, { "category": "external", "summary": "RHBZ#1618170", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618170" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3810", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3810" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3810", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3810" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-08-02T18:39:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nMultilib systems may experience difficulty if trying to specify the package\nby name to the Update Agent via a command line argument. This can be\nsolved by executing the following commands:\n\nup2date seamonkey; up2date seamonkey-nss seamonkey-nspr", "product_ids": [ "4AS:devhelp-0:0.10-0.2.el4.i386", "4AS:devhelp-0:0.10-0.2.el4.ppc", "4AS:devhelp-0:0.10-0.2.el4.src", "4AS:devhelp-0:0.10-0.2.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.2.el4.i386", "4AS:devhelp-devel-0:0.10-0.2.el4.ppc", "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4AS:seamonkey-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-0:1.0.3-0.el4.1.src", "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4Desktop:devhelp-0:0.10-0.2.el4.i386", "4Desktop:devhelp-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-0:0.10-0.2.el4.src", "4Desktop:devhelp-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-0:1.0.3-0.el4.1.src", "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4ES:devhelp-0:0.10-0.2.el4.i386", "4ES:devhelp-0:0.10-0.2.el4.ppc", "4ES:devhelp-0:0.10-0.2.el4.src", "4ES:devhelp-0:0.10-0.2.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.2.el4.i386", "4ES:devhelp-devel-0:0.10-0.2.el4.ppc", "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64", "4ES:seamonkey-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-0:1.0.3-0.el4.1.src", "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4WS:devhelp-0:0.10-0.2.el4.i386", "4WS:devhelp-0:0.10-0.2.el4.ppc", "4WS:devhelp-0:0.10-0.2.el4.src", "4WS:devhelp-0:0.10-0.2.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.2.el4.i386", "4WS:devhelp-devel-0:0.10-0.2.el4.ppc", "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4WS:seamonkey-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-0:1.0.3-0.el4.1.src", "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0609" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2006-3811", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618171" } ], "notes": [ { "category": "description", "text": "Multiple vulnerabilities in Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via Javascript that leads to memory corruption, including (1) nsListControlFrame::FireMenuItemActiveEvent, (2) buffer overflows in the string class in out-of-memory conditions, (3) table row and column groups, (4) \"anonymous box selectors outside of UA stylesheets,\" (5) stale references to \"removed nodes,\" and (6) running the crypto.generateCRMFRequest callback on deleted context.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:devhelp-0:0.10-0.2.el4.i386", "4AS:devhelp-0:0.10-0.2.el4.ppc", "4AS:devhelp-0:0.10-0.2.el4.src", "4AS:devhelp-0:0.10-0.2.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.2.el4.i386", "4AS:devhelp-devel-0:0.10-0.2.el4.ppc", "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4AS:seamonkey-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-0:1.0.3-0.el4.1.src", "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4Desktop:devhelp-0:0.10-0.2.el4.i386", "4Desktop:devhelp-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-0:0.10-0.2.el4.src", "4Desktop:devhelp-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-0:1.0.3-0.el4.1.src", "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4ES:devhelp-0:0.10-0.2.el4.i386", "4ES:devhelp-0:0.10-0.2.el4.ppc", "4ES:devhelp-0:0.10-0.2.el4.src", "4ES:devhelp-0:0.10-0.2.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.2.el4.i386", "4ES:devhelp-devel-0:0.10-0.2.el4.ppc", "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64", "4ES:seamonkey-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-0:1.0.3-0.el4.1.src", "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4WS:devhelp-0:0.10-0.2.el4.i386", "4WS:devhelp-0:0.10-0.2.el4.ppc", "4WS:devhelp-0:0.10-0.2.el4.src", "4WS:devhelp-0:0.10-0.2.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.2.el4.i386", "4WS:devhelp-devel-0:0.10-0.2.el4.ppc", "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4WS:seamonkey-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-0:1.0.3-0.el4.1.src", "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3811" }, { "category": "external", "summary": "RHBZ#1618171", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618171" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3811", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3811" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3811", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3811" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-08-02T18:39:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nMultilib systems may experience difficulty if trying to specify the package\nby name to the Update Agent via a command line argument. This can be\nsolved by executing the following commands:\n\nup2date seamonkey; up2date seamonkey-nss seamonkey-nspr", "product_ids": [ "4AS:devhelp-0:0.10-0.2.el4.i386", "4AS:devhelp-0:0.10-0.2.el4.ppc", "4AS:devhelp-0:0.10-0.2.el4.src", "4AS:devhelp-0:0.10-0.2.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.2.el4.i386", "4AS:devhelp-devel-0:0.10-0.2.el4.ppc", "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4AS:seamonkey-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-0:1.0.3-0.el4.1.src", "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4Desktop:devhelp-0:0.10-0.2.el4.i386", "4Desktop:devhelp-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-0:0.10-0.2.el4.src", "4Desktop:devhelp-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-0:1.0.3-0.el4.1.src", "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4ES:devhelp-0:0.10-0.2.el4.i386", "4ES:devhelp-0:0.10-0.2.el4.ppc", "4ES:devhelp-0:0.10-0.2.el4.src", "4ES:devhelp-0:0.10-0.2.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.2.el4.i386", "4ES:devhelp-devel-0:0.10-0.2.el4.ppc", "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64", "4ES:seamonkey-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-0:1.0.3-0.el4.1.src", "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4WS:devhelp-0:0.10-0.2.el4.i386", "4WS:devhelp-0:0.10-0.2.el4.ppc", "4WS:devhelp-0:0.10-0.2.el4.src", "4WS:devhelp-0:0.10-0.2.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.2.el4.i386", "4WS:devhelp-devel-0:0.10-0.2.el4.ppc", "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4WS:seamonkey-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-0:1.0.3-0.el4.1.src", "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0609" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-3812", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "200455" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to reference remote files and possibly load chrome: URLs by tricking the user into copying or dragging links.", "title": "Vulnerability description" }, { "category": "summary", "text": "vulnerabilities: CVE-2006-{3113,3677,3801-3812}", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:devhelp-0:0.10-0.2.el4.i386", "4AS:devhelp-0:0.10-0.2.el4.ppc", "4AS:devhelp-0:0.10-0.2.el4.src", "4AS:devhelp-0:0.10-0.2.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.2.el4.i386", "4AS:devhelp-devel-0:0.10-0.2.el4.ppc", "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4AS:seamonkey-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-0:1.0.3-0.el4.1.src", "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4Desktop:devhelp-0:0.10-0.2.el4.i386", "4Desktop:devhelp-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-0:0.10-0.2.el4.src", "4Desktop:devhelp-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-0:1.0.3-0.el4.1.src", "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4ES:devhelp-0:0.10-0.2.el4.i386", "4ES:devhelp-0:0.10-0.2.el4.ppc", "4ES:devhelp-0:0.10-0.2.el4.src", "4ES:devhelp-0:0.10-0.2.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.2.el4.i386", "4ES:devhelp-devel-0:0.10-0.2.el4.ppc", "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64", "4ES:seamonkey-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-0:1.0.3-0.el4.1.src", "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4WS:devhelp-0:0.10-0.2.el4.i386", "4WS:devhelp-0:0.10-0.2.el4.ppc", "4WS:devhelp-0:0.10-0.2.el4.src", "4WS:devhelp-0:0.10-0.2.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.2.el4.i386", "4WS:devhelp-devel-0:0.10-0.2.el4.ppc", "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4WS:seamonkey-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-0:1.0.3-0.el4.1.src", "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3812" }, { "category": "external", "summary": "RHBZ#200455", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=200455" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3812", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3812" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3812", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3812" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-08-02T18:39:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nMultilib systems may experience difficulty if trying to specify the package\nby name to the Update Agent via a command line argument. This can be\nsolved by executing the following commands:\n\nup2date seamonkey; up2date seamonkey-nss seamonkey-nspr", "product_ids": [ "4AS:devhelp-0:0.10-0.2.el4.i386", "4AS:devhelp-0:0.10-0.2.el4.ppc", "4AS:devhelp-0:0.10-0.2.el4.src", "4AS:devhelp-0:0.10-0.2.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.2.el4.i386", "4AS:devhelp-devel-0:0.10-0.2.el4.ppc", "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4AS:seamonkey-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-0:1.0.3-0.el4.1.src", "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4Desktop:devhelp-0:0.10-0.2.el4.i386", "4Desktop:devhelp-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-0:0.10-0.2.el4.src", "4Desktop:devhelp-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-0:1.0.3-0.el4.1.src", "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4ES:devhelp-0:0.10-0.2.el4.i386", "4ES:devhelp-0:0.10-0.2.el4.ppc", "4ES:devhelp-0:0.10-0.2.el4.src", "4ES:devhelp-0:0.10-0.2.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.2.el4.i386", "4ES:devhelp-devel-0:0.10-0.2.el4.ppc", "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64", "4ES:seamonkey-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-0:1.0.3-0.el4.1.src", "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4WS:devhelp-0:0.10-0.2.el4.i386", "4WS:devhelp-0:0.10-0.2.el4.ppc", "4WS:devhelp-0:0.10-0.2.el4.src", "4WS:devhelp-0:0.10-0.2.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.2.el4.i386", "4WS:devhelp-devel-0:0.10-0.2.el4.ppc", "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4WS:seamonkey-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-0:1.0.3-0.el4.1.src", "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0609" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "vulnerabilities: CVE-2006-{3113,3677,3801-3812}" } ] }
rhsa-2006:0609
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated seamonkey packages that fix several security bugs in the mozilla\npackage are now available for Red Hat Enterprise Linux 4.\n\nThis update has been rated as having critical security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "Seamonkey is an open source Web browser, advanced email and newsgroup\nclient, IRC chat client, and HTML editor.\n\nThe Mozilla Foundation has discontinued support for the Mozilla Suite. This\nupdate deprecates the Mozilla Suite in Red Hat Enterprise Linux 4 in\nfavor of the supported Seamonkey Suite.\n\nThis update also resolves a number of outstanding Mozilla security issues:\n\nSeveral flaws were found in the way Seamonkey processed certain javascript\nactions. A malicious web page could execute arbitrary javascript\ninstructions with the permissions of \"chrome\", allowing the page to steal\nsensitive information or install browser malware. (CVE-2006-2776,\nCVE-2006-2784, CVE-2006-2785, CVE-2006-2787, CVE-2006-3807, CVE-2006-3809,\nCVE-2006-3812)\n\nSeveral denial of service flaws were found in the way Seamonkey processed\ncertain web content. A malicious web page could crash the browser or\npossibly execute arbitrary code as the user running Seamonkey.\n(CVE-2006-2779, CVE-2006-2780, CVE-2006-3801, CVE-2006-3677, CVE-2006-3113,\nCVE-2006-3803, CVE-2006-3805, CVE-2006-3806, CVE-2006-3811)\n\nTwo flaws were found in the way Seamonkey-mail displayed malformed\ninline vcard attachments. If a victim viewed an email message containing\na carefully crafted vcard it was possible to execute arbitrary code as the\nuser running Mozilla-mail. (CVE-2006-2781, CVE-2006-3804)\n\nA cross-site scripting flaw was found in the way Seamonkey processed\nUnicode Byte-Order-Mark (BOM) markers in UTF-8 web pages. A malicious web\npage could execute a script within the browser that a web input sanitizer\ncould miss due to a malformed \"script\" tag. (CVE-2006-2783)\n\nSeveral flaws were found in the way Seamonkey processed certain javascript\nactions. A malicious web page could conduct a cross-site scripting attack\nor steal sensitive information (such as cookies owned by other domains).\n(CVE-2006-3802, CVE-2006-3810)\n\nA form file upload flaw was found in the way Seamonkey handled javascript\ninput object mutation. A malicious web page could upload an arbitrary local\nfile at form submission time without user interaction. (CVE-2006-2782)\n\nA denial of service flaw was found in the way Seamonkey called the\ncrypto.signText() javascript function. A malicious web page could crash the\nbrowser if the victim had a client certificate loaded. (CVE-2006-2778)\n\nTwo HTTP response smuggling flaws were found in the way Seamonkey processed\ncertain invalid HTTP response headers. A malicious web site could return\nspecially crafted HTTP response headers which may bypass HTTP proxy\nrestrictions. (CVE-2006-2786)\n\nA flaw was found in the way Seamonkey processed Proxy AutoConfig scripts. A\nmalicious Proxy AutoConfig server could execute arbitrary javascript\ninstructions with the permissions of \"chrome\", allowing the page to steal\nsensitive information or install browser malware. (CVE-2006-3808)\n\nA double free flaw was found in the way the nsIX509::getRawDER method was\ncalled. If a victim visited a carefully crafted web page, it was possible\nto execute arbitrary code as the user running Mozilla. (CVE-2006-2788)\n\nUsers of Mozilla are advised to upgrade to this update, which contains\nSeamonkey version 1.0.3 that corrects these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2006:0609", "url": "https://access.redhat.com/errata/RHSA-2006:0609" }, { "category": "external", "summary": "193906", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=193906" }, { "category": "external", "summary": "http://www.redhat.com/security/updates/classification/#critical", "url": "http://www.redhat.com/security/updates/classification/#critical" }, { "category": "external", "summary": "196969", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=196969" }, { "category": "external", "summary": "200161", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=200161" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2006/rhsa-2006_0609.json" } ], "title": "Red Hat Security Advisory: seamonkey security update", "tracking": { "current_release_date": "2025-09-10T13:38:42+00:00", "generator": { "date": "2025-09-10T13:38:42+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.7" } }, "id": "RHSA-2006:0609", "initial_release_date": "2006-08-02T18:39:00+00:00", "revision_history": [ { "date": "2006-08-02T18:39:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2006-08-02T00:00:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-09-10T13:38:42+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 4", "product": { "name": "Red Hat Enterprise Linux AS version 4", "product_id": "4AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::as" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop version 4", "product": { "name": "Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 4", "product": { "name": "Red Hat Enterprise Linux ES version 4", "product_id": "4ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 4", "product": { "name": "Red Hat Enterprise Linux WS version 4", "product_id": "4WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::ws" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "seamonkey-mail-0:1.0.3-0.el4.1.ia64", "product": { "name": "seamonkey-mail-0:1.0.3-0.el4.1.ia64", "product_id": "seamonkey-mail-0:1.0.3-0.el4.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-mail@1.0.3-0.el4.1?arch=ia64" } } }, { "category": "product_version", "name": "seamonkey-devel-0:1.0.3-0.el4.1.ia64", "product": { "name": "seamonkey-devel-0:1.0.3-0.el4.1.ia64", "product_id": "seamonkey-devel-0:1.0.3-0.el4.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-devel@1.0.3-0.el4.1?arch=ia64" } } }, { "category": "product_version", "name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "product": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "product_id": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-dom-inspector@1.0.3-0.el4.1?arch=ia64" } } }, { "category": "product_version", "name": "seamonkey-0:1.0.3-0.el4.1.ia64", "product": { "name": "seamonkey-0:1.0.3-0.el4.1.ia64", "product_id": "seamonkey-0:1.0.3-0.el4.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey@1.0.3-0.el4.1?arch=ia64" } } }, { "category": "product_version", "name": "seamonkey-chat-0:1.0.3-0.el4.1.ia64", "product": { "name": "seamonkey-chat-0:1.0.3-0.el4.1.ia64", "product_id": "seamonkey-chat-0:1.0.3-0.el4.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-chat@1.0.3-0.el4.1?arch=ia64" } } }, { "category": "product_version", "name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "product": { "name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "product_id": "seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-debuginfo@1.0.3-0.el4.1?arch=ia64" } } }, { "category": "product_version", "name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "product": { "name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "product_id": "seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-js-debugger@1.0.3-0.el4.1?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "product": { "name": "seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "product_id": "seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-mail@1.0.3-0.el4.1?arch=x86_64" } } }, { "category": "product_version", "name": "seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "product": { "name": "seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "product_id": "seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-devel@1.0.3-0.el4.1?arch=x86_64" } } }, { "category": "product_version", "name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "product": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "product_id": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-dom-inspector@1.0.3-0.el4.1?arch=x86_64" } } }, { "category": "product_version", "name": "seamonkey-0:1.0.3-0.el4.1.x86_64", "product": { "name": "seamonkey-0:1.0.3-0.el4.1.x86_64", "product_id": "seamonkey-0:1.0.3-0.el4.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey@1.0.3-0.el4.1?arch=x86_64" } } }, { "category": "product_version", "name": "seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "product": { "name": "seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "product_id": "seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-chat@1.0.3-0.el4.1?arch=x86_64" } } }, { "category": "product_version", "name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "product": { "name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "product_id": "seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-debuginfo@1.0.3-0.el4.1?arch=x86_64" } } }, { "category": "product_version", "name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "product": { "name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "product_id": "seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-js-debugger@1.0.3-0.el4.1?arch=x86_64" } } }, { "category": "product_version", "name": "devhelp-devel-0:0.10-0.2.el4.x86_64", "product": { "name": "devhelp-devel-0:0.10-0.2.el4.x86_64", "product_id": "devhelp-devel-0:0.10-0.2.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/devhelp-devel@0.10-0.2.el4?arch=x86_64" } } }, { "category": "product_version", "name": "devhelp-0:0.10-0.2.el4.x86_64", "product": { "name": "devhelp-0:0.10-0.2.el4.x86_64", "product_id": "devhelp-0:0.10-0.2.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/devhelp@0.10-0.2.el4?arch=x86_64" } } }, { "category": "product_version", "name": "devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "product": { "name": "devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "product_id": "devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/devhelp-debuginfo@0.10-0.2.el4?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "seamonkey-mail-0:1.0.3-0.el4.1.i386", "product": { "name": "seamonkey-mail-0:1.0.3-0.el4.1.i386", "product_id": "seamonkey-mail-0:1.0.3-0.el4.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-mail@1.0.3-0.el4.1?arch=i386" } } }, { "category": "product_version", "name": "seamonkey-devel-0:1.0.3-0.el4.1.i386", "product": { "name": "seamonkey-devel-0:1.0.3-0.el4.1.i386", "product_id": "seamonkey-devel-0:1.0.3-0.el4.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-devel@1.0.3-0.el4.1?arch=i386" } } }, { "category": "product_version", "name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "product": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "product_id": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-dom-inspector@1.0.3-0.el4.1?arch=i386" } } }, { "category": "product_version", "name": "seamonkey-0:1.0.3-0.el4.1.i386", "product": { "name": "seamonkey-0:1.0.3-0.el4.1.i386", "product_id": "seamonkey-0:1.0.3-0.el4.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey@1.0.3-0.el4.1?arch=i386" } } }, { "category": "product_version", "name": "seamonkey-chat-0:1.0.3-0.el4.1.i386", "product": { "name": "seamonkey-chat-0:1.0.3-0.el4.1.i386", "product_id": "seamonkey-chat-0:1.0.3-0.el4.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-chat@1.0.3-0.el4.1?arch=i386" } } }, { "category": "product_version", "name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "product": { "name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "product_id": "seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-debuginfo@1.0.3-0.el4.1?arch=i386" } } }, { "category": "product_version", "name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "product": { "name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "product_id": "seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-js-debugger@1.0.3-0.el4.1?arch=i386" } } }, { "category": "product_version", "name": "devhelp-devel-0:0.10-0.2.el4.i386", "product": { "name": "devhelp-devel-0:0.10-0.2.el4.i386", "product_id": "devhelp-devel-0:0.10-0.2.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/devhelp-devel@0.10-0.2.el4?arch=i386" } } }, { "category": "product_version", "name": "devhelp-0:0.10-0.2.el4.i386", "product": { "name": "devhelp-0:0.10-0.2.el4.i386", "product_id": "devhelp-0:0.10-0.2.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/devhelp@0.10-0.2.el4?arch=i386" } } }, { "category": "product_version", "name": "devhelp-debuginfo-0:0.10-0.2.el4.i386", "product": { "name": "devhelp-debuginfo-0:0.10-0.2.el4.i386", "product_id": "devhelp-debuginfo-0:0.10-0.2.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/devhelp-debuginfo@0.10-0.2.el4?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "seamonkey-0:1.0.3-0.el4.1.src", "product": { "name": "seamonkey-0:1.0.3-0.el4.1.src", "product_id": "seamonkey-0:1.0.3-0.el4.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey@1.0.3-0.el4.1?arch=src" } } }, { "category": "product_version", "name": "devhelp-0:0.10-0.2.el4.src", "product": { "name": "devhelp-0:0.10-0.2.el4.src", "product_id": "devhelp-0:0.10-0.2.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/devhelp@0.10-0.2.el4?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "seamonkey-mail-0:1.0.3-0.el4.1.ppc", "product": { "name": "seamonkey-mail-0:1.0.3-0.el4.1.ppc", "product_id": "seamonkey-mail-0:1.0.3-0.el4.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-mail@1.0.3-0.el4.1?arch=ppc" } } }, { "category": "product_version", "name": "seamonkey-devel-0:1.0.3-0.el4.1.ppc", "product": { "name": "seamonkey-devel-0:1.0.3-0.el4.1.ppc", "product_id": "seamonkey-devel-0:1.0.3-0.el4.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-devel@1.0.3-0.el4.1?arch=ppc" } } }, { "category": "product_version", "name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "product": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "product_id": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-dom-inspector@1.0.3-0.el4.1?arch=ppc" } } }, { "category": "product_version", "name": "seamonkey-0:1.0.3-0.el4.1.ppc", "product": { "name": "seamonkey-0:1.0.3-0.el4.1.ppc", "product_id": "seamonkey-0:1.0.3-0.el4.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey@1.0.3-0.el4.1?arch=ppc" } } }, { "category": "product_version", "name": "seamonkey-chat-0:1.0.3-0.el4.1.ppc", "product": { "name": "seamonkey-chat-0:1.0.3-0.el4.1.ppc", "product_id": "seamonkey-chat-0:1.0.3-0.el4.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-chat@1.0.3-0.el4.1?arch=ppc" } } }, { "category": "product_version", "name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "product": { "name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "product_id": "seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-debuginfo@1.0.3-0.el4.1?arch=ppc" } } }, { "category": "product_version", "name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "product": { "name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "product_id": "seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-js-debugger@1.0.3-0.el4.1?arch=ppc" } } }, { "category": "product_version", "name": "devhelp-devel-0:0.10-0.2.el4.ppc", "product": { "name": "devhelp-devel-0:0.10-0.2.el4.ppc", "product_id": "devhelp-devel-0:0.10-0.2.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/devhelp-devel@0.10-0.2.el4?arch=ppc" } } }, { "category": "product_version", "name": "devhelp-0:0.10-0.2.el4.ppc", "product": { "name": "devhelp-0:0.10-0.2.el4.ppc", "product_id": "devhelp-0:0.10-0.2.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/devhelp@0.10-0.2.el4?arch=ppc" } } }, { "category": "product_version", "name": "devhelp-debuginfo-0:0.10-0.2.el4.ppc", "product": { "name": "devhelp-debuginfo-0:0.10-0.2.el4.ppc", "product_id": "devhelp-debuginfo-0:0.10-0.2.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/devhelp-debuginfo@0.10-0.2.el4?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "seamonkey-mail-0:1.0.3-0.el4.1.s390x", "product": { "name": "seamonkey-mail-0:1.0.3-0.el4.1.s390x", "product_id": "seamonkey-mail-0:1.0.3-0.el4.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-mail@1.0.3-0.el4.1?arch=s390x" } } }, { "category": "product_version", "name": "seamonkey-devel-0:1.0.3-0.el4.1.s390x", "product": { "name": "seamonkey-devel-0:1.0.3-0.el4.1.s390x", "product_id": "seamonkey-devel-0:1.0.3-0.el4.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-devel@1.0.3-0.el4.1?arch=s390x" } } }, { "category": "product_version", "name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "product": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "product_id": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-dom-inspector@1.0.3-0.el4.1?arch=s390x" } } }, { "category": "product_version", "name": "seamonkey-0:1.0.3-0.el4.1.s390x", "product": { "name": "seamonkey-0:1.0.3-0.el4.1.s390x", "product_id": "seamonkey-0:1.0.3-0.el4.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey@1.0.3-0.el4.1?arch=s390x" } } }, { "category": "product_version", "name": "seamonkey-chat-0:1.0.3-0.el4.1.s390x", "product": { "name": "seamonkey-chat-0:1.0.3-0.el4.1.s390x", "product_id": "seamonkey-chat-0:1.0.3-0.el4.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-chat@1.0.3-0.el4.1?arch=s390x" } } }, { "category": "product_version", "name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "product": { "name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "product_id": "seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-debuginfo@1.0.3-0.el4.1?arch=s390x" } } }, { "category": "product_version", "name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "product": { "name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "product_id": "seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-js-debugger@1.0.3-0.el4.1?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "seamonkey-mail-0:1.0.3-0.el4.1.s390", "product": { "name": "seamonkey-mail-0:1.0.3-0.el4.1.s390", "product_id": "seamonkey-mail-0:1.0.3-0.el4.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-mail@1.0.3-0.el4.1?arch=s390" } } }, { "category": "product_version", "name": "seamonkey-devel-0:1.0.3-0.el4.1.s390", "product": { "name": "seamonkey-devel-0:1.0.3-0.el4.1.s390", "product_id": "seamonkey-devel-0:1.0.3-0.el4.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-devel@1.0.3-0.el4.1?arch=s390" } } }, { "category": "product_version", "name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "product": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "product_id": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-dom-inspector@1.0.3-0.el4.1?arch=s390" } } }, { "category": "product_version", "name": "seamonkey-0:1.0.3-0.el4.1.s390", "product": { "name": "seamonkey-0:1.0.3-0.el4.1.s390", "product_id": "seamonkey-0:1.0.3-0.el4.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey@1.0.3-0.el4.1?arch=s390" } } }, { "category": "product_version", "name": "seamonkey-chat-0:1.0.3-0.el4.1.s390", "product": { "name": "seamonkey-chat-0:1.0.3-0.el4.1.s390", "product_id": "seamonkey-chat-0:1.0.3-0.el4.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-chat@1.0.3-0.el4.1?arch=s390" } } }, { "category": "product_version", "name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "product": { "name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "product_id": "seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-debuginfo@1.0.3-0.el4.1?arch=s390" } } }, { "category": "product_version", "name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "product": { "name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "product_id": "seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-js-debugger@1.0.3-0.el4.1?arch=s390" } } } ], "category": "architecture", "name": "s390" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "devhelp-0:0.10-0.2.el4.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:devhelp-0:0.10-0.2.el4.i386" }, "product_reference": "devhelp-0:0.10-0.2.el4.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-0:0.10-0.2.el4.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:devhelp-0:0.10-0.2.el4.ppc" }, "product_reference": "devhelp-0:0.10-0.2.el4.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-0:0.10-0.2.el4.src as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:devhelp-0:0.10-0.2.el4.src" }, "product_reference": "devhelp-0:0.10-0.2.el4.src", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-0:0.10-0.2.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:devhelp-0:0.10-0.2.el4.x86_64" }, "product_reference": "devhelp-0:0.10-0.2.el4.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-debuginfo-0:0.10-0.2.el4.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386" }, "product_reference": "devhelp-debuginfo-0:0.10-0.2.el4.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-debuginfo-0:0.10-0.2.el4.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc" }, "product_reference": "devhelp-debuginfo-0:0.10-0.2.el4.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-debuginfo-0:0.10-0.2.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64" }, "product_reference": "devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-devel-0:0.10-0.2.el4.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:devhelp-devel-0:0.10-0.2.el4.i386" }, "product_reference": "devhelp-devel-0:0.10-0.2.el4.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-devel-0:0.10-0.2.el4.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:devhelp-devel-0:0.10-0.2.el4.ppc" }, "product_reference": "devhelp-devel-0:0.10-0.2.el4.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-devel-0:0.10-0.2.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64" }, "product_reference": "devhelp-devel-0:0.10-0.2.el4.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el4.1.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-0:1.0.3-0.el4.1.i386" }, "product_reference": "seamonkey-0:1.0.3-0.el4.1.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el4.1.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-0:1.0.3-0.el4.1.ia64" }, "product_reference": "seamonkey-0:1.0.3-0.el4.1.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el4.1.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-0:1.0.3-0.el4.1.ppc" }, "product_reference": "seamonkey-0:1.0.3-0.el4.1.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el4.1.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-0:1.0.3-0.el4.1.s390" }, "product_reference": "seamonkey-0:1.0.3-0.el4.1.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el4.1.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-0:1.0.3-0.el4.1.s390x" }, "product_reference": "seamonkey-0:1.0.3-0.el4.1.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el4.1.src as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-0:1.0.3-0.el4.1.src" }, "product_reference": "seamonkey-0:1.0.3-0.el4.1.src", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64" }, "product_reference": "seamonkey-0:1.0.3-0.el4.1.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.3-0.el4.1.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386" }, "product_reference": "seamonkey-chat-0:1.0.3-0.el4.1.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.3-0.el4.1.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64" }, "product_reference": "seamonkey-chat-0:1.0.3-0.el4.1.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.3-0.el4.1.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc" }, "product_reference": "seamonkey-chat-0:1.0.3-0.el4.1.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.3-0.el4.1.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390" }, "product_reference": "seamonkey-chat-0:1.0.3-0.el4.1.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.3-0.el4.1.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x" }, "product_reference": "seamonkey-chat-0:1.0.3-0.el4.1.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.3-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64" }, "product_reference": "seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386" }, "product_reference": "seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64" }, "product_reference": "seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc" }, "product_reference": "seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390" }, "product_reference": "seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x" }, "product_reference": "seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64" }, "product_reference": "seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.3-0.el4.1.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386" }, "product_reference": "seamonkey-devel-0:1.0.3-0.el4.1.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.3-0.el4.1.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64" }, "product_reference": "seamonkey-devel-0:1.0.3-0.el4.1.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.3-0.el4.1.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc" }, "product_reference": "seamonkey-devel-0:1.0.3-0.el4.1.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.3-0.el4.1.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390" }, "product_reference": "seamonkey-devel-0:1.0.3-0.el4.1.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.3-0.el4.1.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x" }, "product_reference": "seamonkey-devel-0:1.0.3-0.el4.1.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.3-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64" }, "product_reference": "seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386" }, "product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64" }, "product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc" }, "product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390" }, "product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x" }, "product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64" }, "product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386" }, "product_reference": "seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64" }, "product_reference": "seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc" }, "product_reference": "seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390" }, "product_reference": "seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x" }, "product_reference": "seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64" }, "product_reference": "seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.3-0.el4.1.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386" }, "product_reference": "seamonkey-mail-0:1.0.3-0.el4.1.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.3-0.el4.1.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64" }, "product_reference": "seamonkey-mail-0:1.0.3-0.el4.1.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.3-0.el4.1.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc" }, "product_reference": "seamonkey-mail-0:1.0.3-0.el4.1.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.3-0.el4.1.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390" }, "product_reference": "seamonkey-mail-0:1.0.3-0.el4.1.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.3-0.el4.1.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x" }, "product_reference": "seamonkey-mail-0:1.0.3-0.el4.1.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.3-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" }, "product_reference": "seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-0:0.10-0.2.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:devhelp-0:0.10-0.2.el4.i386" }, "product_reference": "devhelp-0:0.10-0.2.el4.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-0:0.10-0.2.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:devhelp-0:0.10-0.2.el4.ppc" }, "product_reference": "devhelp-0:0.10-0.2.el4.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-0:0.10-0.2.el4.src as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:devhelp-0:0.10-0.2.el4.src" }, "product_reference": "devhelp-0:0.10-0.2.el4.src", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-0:0.10-0.2.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:devhelp-0:0.10-0.2.el4.x86_64" }, "product_reference": "devhelp-0:0.10-0.2.el4.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-debuginfo-0:0.10-0.2.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386" }, "product_reference": "devhelp-debuginfo-0:0.10-0.2.el4.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-debuginfo-0:0.10-0.2.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc" }, "product_reference": "devhelp-debuginfo-0:0.10-0.2.el4.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-debuginfo-0:0.10-0.2.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64" }, "product_reference": "devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-devel-0:0.10-0.2.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386" }, "product_reference": "devhelp-devel-0:0.10-0.2.el4.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-devel-0:0.10-0.2.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc" }, "product_reference": "devhelp-devel-0:0.10-0.2.el4.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-devel-0:0.10-0.2.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64" }, "product_reference": "devhelp-devel-0:0.10-0.2.el4.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el4.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386" }, "product_reference": "seamonkey-0:1.0.3-0.el4.1.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el4.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64" }, "product_reference": "seamonkey-0:1.0.3-0.el4.1.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el4.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc" }, "product_reference": "seamonkey-0:1.0.3-0.el4.1.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el4.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390" }, "product_reference": "seamonkey-0:1.0.3-0.el4.1.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el4.1.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x" }, "product_reference": "seamonkey-0:1.0.3-0.el4.1.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el4.1.src as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-0:1.0.3-0.el4.1.src" }, "product_reference": "seamonkey-0:1.0.3-0.el4.1.src", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64" }, "product_reference": "seamonkey-0:1.0.3-0.el4.1.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.3-0.el4.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386" }, "product_reference": "seamonkey-chat-0:1.0.3-0.el4.1.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.3-0.el4.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64" }, "product_reference": "seamonkey-chat-0:1.0.3-0.el4.1.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.3-0.el4.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc" }, "product_reference": "seamonkey-chat-0:1.0.3-0.el4.1.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.3-0.el4.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390" }, "product_reference": "seamonkey-chat-0:1.0.3-0.el4.1.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.3-0.el4.1.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x" }, "product_reference": "seamonkey-chat-0:1.0.3-0.el4.1.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.3-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64" }, "product_reference": "seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386" }, "product_reference": "seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64" }, "product_reference": "seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc" }, "product_reference": "seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390" }, "product_reference": "seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x" }, "product_reference": "seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64" }, "product_reference": "seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.3-0.el4.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386" }, "product_reference": "seamonkey-devel-0:1.0.3-0.el4.1.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.3-0.el4.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64" }, "product_reference": "seamonkey-devel-0:1.0.3-0.el4.1.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.3-0.el4.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc" }, "product_reference": "seamonkey-devel-0:1.0.3-0.el4.1.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.3-0.el4.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390" }, "product_reference": "seamonkey-devel-0:1.0.3-0.el4.1.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.3-0.el4.1.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x" }, "product_reference": "seamonkey-devel-0:1.0.3-0.el4.1.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.3-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64" }, "product_reference": "seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386" }, "product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64" }, "product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc" }, "product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390" }, "product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x" }, "product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64" }, "product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386" }, "product_reference": "seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64" }, "product_reference": "seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc" }, "product_reference": "seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390" }, "product_reference": "seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x" }, "product_reference": "seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64" }, "product_reference": "seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.3-0.el4.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386" }, "product_reference": "seamonkey-mail-0:1.0.3-0.el4.1.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.3-0.el4.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64" }, "product_reference": "seamonkey-mail-0:1.0.3-0.el4.1.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.3-0.el4.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc" }, "product_reference": "seamonkey-mail-0:1.0.3-0.el4.1.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.3-0.el4.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390" }, "product_reference": "seamonkey-mail-0:1.0.3-0.el4.1.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.3-0.el4.1.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x" }, "product_reference": "seamonkey-mail-0:1.0.3-0.el4.1.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.3-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" }, "product_reference": "seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-0:0.10-0.2.el4.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:devhelp-0:0.10-0.2.el4.i386" }, "product_reference": "devhelp-0:0.10-0.2.el4.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-0:0.10-0.2.el4.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:devhelp-0:0.10-0.2.el4.ppc" }, "product_reference": "devhelp-0:0.10-0.2.el4.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-0:0.10-0.2.el4.src as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:devhelp-0:0.10-0.2.el4.src" }, "product_reference": "devhelp-0:0.10-0.2.el4.src", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-0:0.10-0.2.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:devhelp-0:0.10-0.2.el4.x86_64" }, "product_reference": "devhelp-0:0.10-0.2.el4.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-debuginfo-0:0.10-0.2.el4.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386" }, "product_reference": "devhelp-debuginfo-0:0.10-0.2.el4.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-debuginfo-0:0.10-0.2.el4.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc" }, "product_reference": "devhelp-debuginfo-0:0.10-0.2.el4.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-debuginfo-0:0.10-0.2.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64" }, "product_reference": "devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-devel-0:0.10-0.2.el4.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:devhelp-devel-0:0.10-0.2.el4.i386" }, "product_reference": "devhelp-devel-0:0.10-0.2.el4.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-devel-0:0.10-0.2.el4.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:devhelp-devel-0:0.10-0.2.el4.ppc" }, "product_reference": "devhelp-devel-0:0.10-0.2.el4.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-devel-0:0.10-0.2.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64" }, "product_reference": "devhelp-devel-0:0.10-0.2.el4.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el4.1.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-0:1.0.3-0.el4.1.i386" }, "product_reference": "seamonkey-0:1.0.3-0.el4.1.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el4.1.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-0:1.0.3-0.el4.1.ia64" }, "product_reference": "seamonkey-0:1.0.3-0.el4.1.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el4.1.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-0:1.0.3-0.el4.1.ppc" }, "product_reference": "seamonkey-0:1.0.3-0.el4.1.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el4.1.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-0:1.0.3-0.el4.1.s390" }, "product_reference": "seamonkey-0:1.0.3-0.el4.1.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el4.1.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-0:1.0.3-0.el4.1.s390x" }, "product_reference": "seamonkey-0:1.0.3-0.el4.1.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el4.1.src as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-0:1.0.3-0.el4.1.src" }, "product_reference": "seamonkey-0:1.0.3-0.el4.1.src", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64" }, "product_reference": "seamonkey-0:1.0.3-0.el4.1.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.3-0.el4.1.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386" }, "product_reference": "seamonkey-chat-0:1.0.3-0.el4.1.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.3-0.el4.1.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64" }, "product_reference": "seamonkey-chat-0:1.0.3-0.el4.1.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.3-0.el4.1.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc" }, "product_reference": "seamonkey-chat-0:1.0.3-0.el4.1.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.3-0.el4.1.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390" }, "product_reference": "seamonkey-chat-0:1.0.3-0.el4.1.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.3-0.el4.1.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x" }, "product_reference": "seamonkey-chat-0:1.0.3-0.el4.1.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.3-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64" }, "product_reference": "seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386" }, "product_reference": "seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64" }, "product_reference": "seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc" }, "product_reference": "seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390" }, "product_reference": "seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x" }, "product_reference": "seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64" }, "product_reference": "seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.3-0.el4.1.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386" }, "product_reference": "seamonkey-devel-0:1.0.3-0.el4.1.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.3-0.el4.1.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64" }, "product_reference": "seamonkey-devel-0:1.0.3-0.el4.1.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.3-0.el4.1.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc" }, "product_reference": "seamonkey-devel-0:1.0.3-0.el4.1.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.3-0.el4.1.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390" }, "product_reference": "seamonkey-devel-0:1.0.3-0.el4.1.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.3-0.el4.1.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x" }, "product_reference": "seamonkey-devel-0:1.0.3-0.el4.1.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.3-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64" }, "product_reference": "seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386" }, "product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64" }, "product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc" }, "product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390" }, "product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x" }, "product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64" }, "product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386" }, "product_reference": "seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64" }, "product_reference": "seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc" }, "product_reference": "seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390" }, "product_reference": "seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x" }, "product_reference": "seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64" }, "product_reference": "seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.3-0.el4.1.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386" }, "product_reference": "seamonkey-mail-0:1.0.3-0.el4.1.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.3-0.el4.1.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64" }, "product_reference": "seamonkey-mail-0:1.0.3-0.el4.1.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.3-0.el4.1.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc" }, "product_reference": "seamonkey-mail-0:1.0.3-0.el4.1.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.3-0.el4.1.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390" }, "product_reference": "seamonkey-mail-0:1.0.3-0.el4.1.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.3-0.el4.1.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x" }, "product_reference": "seamonkey-mail-0:1.0.3-0.el4.1.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.3-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" }, "product_reference": "seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-0:0.10-0.2.el4.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:devhelp-0:0.10-0.2.el4.i386" }, "product_reference": "devhelp-0:0.10-0.2.el4.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-0:0.10-0.2.el4.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:devhelp-0:0.10-0.2.el4.ppc" }, "product_reference": "devhelp-0:0.10-0.2.el4.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-0:0.10-0.2.el4.src as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:devhelp-0:0.10-0.2.el4.src" }, "product_reference": "devhelp-0:0.10-0.2.el4.src", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-0:0.10-0.2.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:devhelp-0:0.10-0.2.el4.x86_64" }, "product_reference": "devhelp-0:0.10-0.2.el4.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-debuginfo-0:0.10-0.2.el4.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386" }, "product_reference": "devhelp-debuginfo-0:0.10-0.2.el4.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-debuginfo-0:0.10-0.2.el4.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc" }, "product_reference": "devhelp-debuginfo-0:0.10-0.2.el4.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-debuginfo-0:0.10-0.2.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64" }, "product_reference": "devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-devel-0:0.10-0.2.el4.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:devhelp-devel-0:0.10-0.2.el4.i386" }, "product_reference": "devhelp-devel-0:0.10-0.2.el4.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-devel-0:0.10-0.2.el4.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:devhelp-devel-0:0.10-0.2.el4.ppc" }, "product_reference": "devhelp-devel-0:0.10-0.2.el4.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-devel-0:0.10-0.2.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64" }, "product_reference": "devhelp-devel-0:0.10-0.2.el4.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el4.1.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-0:1.0.3-0.el4.1.i386" }, "product_reference": "seamonkey-0:1.0.3-0.el4.1.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el4.1.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-0:1.0.3-0.el4.1.ia64" }, "product_reference": "seamonkey-0:1.0.3-0.el4.1.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el4.1.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-0:1.0.3-0.el4.1.ppc" }, "product_reference": "seamonkey-0:1.0.3-0.el4.1.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el4.1.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-0:1.0.3-0.el4.1.s390" }, "product_reference": "seamonkey-0:1.0.3-0.el4.1.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el4.1.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-0:1.0.3-0.el4.1.s390x" }, "product_reference": "seamonkey-0:1.0.3-0.el4.1.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el4.1.src as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-0:1.0.3-0.el4.1.src" }, "product_reference": "seamonkey-0:1.0.3-0.el4.1.src", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.3-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64" }, "product_reference": "seamonkey-0:1.0.3-0.el4.1.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.3-0.el4.1.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386" }, "product_reference": "seamonkey-chat-0:1.0.3-0.el4.1.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.3-0.el4.1.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64" }, "product_reference": "seamonkey-chat-0:1.0.3-0.el4.1.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.3-0.el4.1.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc" }, "product_reference": "seamonkey-chat-0:1.0.3-0.el4.1.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.3-0.el4.1.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390" }, "product_reference": "seamonkey-chat-0:1.0.3-0.el4.1.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.3-0.el4.1.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x" }, "product_reference": "seamonkey-chat-0:1.0.3-0.el4.1.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.3-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64" }, "product_reference": "seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386" }, "product_reference": "seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64" }, "product_reference": "seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc" }, "product_reference": "seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390" }, "product_reference": "seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x" }, "product_reference": "seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64" }, "product_reference": "seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.3-0.el4.1.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386" }, "product_reference": "seamonkey-devel-0:1.0.3-0.el4.1.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.3-0.el4.1.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64" }, "product_reference": "seamonkey-devel-0:1.0.3-0.el4.1.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.3-0.el4.1.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc" }, "product_reference": "seamonkey-devel-0:1.0.3-0.el4.1.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.3-0.el4.1.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390" }, "product_reference": "seamonkey-devel-0:1.0.3-0.el4.1.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.3-0.el4.1.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x" }, "product_reference": "seamonkey-devel-0:1.0.3-0.el4.1.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.3-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64" }, "product_reference": "seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386" }, "product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64" }, "product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc" }, "product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390" }, "product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x" }, "product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64" }, "product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386" }, "product_reference": "seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64" }, "product_reference": "seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc" }, "product_reference": "seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390" }, "product_reference": "seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x" }, "product_reference": "seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64" }, "product_reference": "seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.3-0.el4.1.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386" }, "product_reference": "seamonkey-mail-0:1.0.3-0.el4.1.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.3-0.el4.1.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64" }, "product_reference": "seamonkey-mail-0:1.0.3-0.el4.1.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.3-0.el4.1.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc" }, "product_reference": "seamonkey-mail-0:1.0.3-0.el4.1.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.3-0.el4.1.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390" }, "product_reference": "seamonkey-mail-0:1.0.3-0.el4.1.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.3-0.el4.1.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x" }, "product_reference": "seamonkey-mail-0:1.0.3-0.el4.1.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.3-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" }, "product_reference": "seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "relates_to_product_reference": "4WS" } ] }, "vulnerabilities": [ { "cve": "CVE-2006-2776", "discovery_date": "2006-05-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618112" } ], "notes": [ { "category": "description", "text": "Certain privileged UI code in Mozilla Firefox and Thunderbird before 1.5.0.4 calls content-defined setters on an object prototype, which allows remote attackers to execute code at a higher privilege than intended.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:devhelp-0:0.10-0.2.el4.i386", "4AS:devhelp-0:0.10-0.2.el4.ppc", "4AS:devhelp-0:0.10-0.2.el4.src", "4AS:devhelp-0:0.10-0.2.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.2.el4.i386", "4AS:devhelp-devel-0:0.10-0.2.el4.ppc", "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4AS:seamonkey-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-0:1.0.3-0.el4.1.src", "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4Desktop:devhelp-0:0.10-0.2.el4.i386", "4Desktop:devhelp-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-0:0.10-0.2.el4.src", "4Desktop:devhelp-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-0:1.0.3-0.el4.1.src", "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4ES:devhelp-0:0.10-0.2.el4.i386", "4ES:devhelp-0:0.10-0.2.el4.ppc", "4ES:devhelp-0:0.10-0.2.el4.src", "4ES:devhelp-0:0.10-0.2.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.2.el4.i386", "4ES:devhelp-devel-0:0.10-0.2.el4.ppc", "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64", "4ES:seamonkey-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-0:1.0.3-0.el4.1.src", "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4WS:devhelp-0:0.10-0.2.el4.i386", "4WS:devhelp-0:0.10-0.2.el4.ppc", "4WS:devhelp-0:0.10-0.2.el4.src", "4WS:devhelp-0:0.10-0.2.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.2.el4.i386", "4WS:devhelp-devel-0:0.10-0.2.el4.ppc", "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4WS:seamonkey-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-0:1.0.3-0.el4.1.src", "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2776" }, { "category": "external", "summary": "RHBZ#1618112", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618112" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2776", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2776" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2776", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2776" } ], "release_date": "2006-06-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-08-02T18:39:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nMultilib systems may experience difficulty if trying to specify the package\nby name to the Update Agent via a command line argument. This can be\nsolved by executing the following commands:\n\nup2date seamonkey; up2date seamonkey-nss seamonkey-nspr", "product_ids": [ "4AS:devhelp-0:0.10-0.2.el4.i386", "4AS:devhelp-0:0.10-0.2.el4.ppc", "4AS:devhelp-0:0.10-0.2.el4.src", "4AS:devhelp-0:0.10-0.2.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.2.el4.i386", "4AS:devhelp-devel-0:0.10-0.2.el4.ppc", "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4AS:seamonkey-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-0:1.0.3-0.el4.1.src", "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4Desktop:devhelp-0:0.10-0.2.el4.i386", "4Desktop:devhelp-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-0:0.10-0.2.el4.src", "4Desktop:devhelp-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-0:1.0.3-0.el4.1.src", "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4ES:devhelp-0:0.10-0.2.el4.i386", "4ES:devhelp-0:0.10-0.2.el4.ppc", "4ES:devhelp-0:0.10-0.2.el4.src", "4ES:devhelp-0:0.10-0.2.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.2.el4.i386", "4ES:devhelp-devel-0:0.10-0.2.el4.ppc", "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64", "4ES:seamonkey-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-0:1.0.3-0.el4.1.src", "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4WS:devhelp-0:0.10-0.2.el4.i386", "4WS:devhelp-0:0.10-0.2.el4.ppc", "4WS:devhelp-0:0.10-0.2.el4.src", "4WS:devhelp-0:0.10-0.2.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.2.el4.i386", "4WS:devhelp-devel-0:0.10-0.2.el4.ppc", "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4WS:seamonkey-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-0:1.0.3-0.el4.1.src", "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0609" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2006-2778", "discovery_date": "2006-05-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618113" } ], "notes": [ { "category": "description", "text": "The crypto.signText function in Mozilla Firefox and Thunderbird before 1.5.0.4 allows remote attackers to execute arbitrary code via certain optional Certificate Authority name arguments, which causes an invalid array index and triggers a buffer overflow.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:devhelp-0:0.10-0.2.el4.i386", "4AS:devhelp-0:0.10-0.2.el4.ppc", "4AS:devhelp-0:0.10-0.2.el4.src", "4AS:devhelp-0:0.10-0.2.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.2.el4.i386", "4AS:devhelp-devel-0:0.10-0.2.el4.ppc", "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4AS:seamonkey-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-0:1.0.3-0.el4.1.src", "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4Desktop:devhelp-0:0.10-0.2.el4.i386", "4Desktop:devhelp-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-0:0.10-0.2.el4.src", "4Desktop:devhelp-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-0:1.0.3-0.el4.1.src", "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4ES:devhelp-0:0.10-0.2.el4.i386", "4ES:devhelp-0:0.10-0.2.el4.ppc", "4ES:devhelp-0:0.10-0.2.el4.src", "4ES:devhelp-0:0.10-0.2.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.2.el4.i386", "4ES:devhelp-devel-0:0.10-0.2.el4.ppc", "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64", "4ES:seamonkey-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-0:1.0.3-0.el4.1.src", "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4WS:devhelp-0:0.10-0.2.el4.i386", "4WS:devhelp-0:0.10-0.2.el4.ppc", "4WS:devhelp-0:0.10-0.2.el4.src", "4WS:devhelp-0:0.10-0.2.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.2.el4.i386", "4WS:devhelp-devel-0:0.10-0.2.el4.ppc", "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4WS:seamonkey-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-0:1.0.3-0.el4.1.src", "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2778" }, { "category": "external", "summary": "RHBZ#1618113", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618113" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2778", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2778" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2778", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2778" } ], "release_date": "2006-06-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-08-02T18:39:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nMultilib systems may experience difficulty if trying to specify the package\nby name to the Update Agent via a command line argument. This can be\nsolved by executing the following commands:\n\nup2date seamonkey; up2date seamonkey-nss seamonkey-nspr", "product_ids": [ "4AS:devhelp-0:0.10-0.2.el4.i386", "4AS:devhelp-0:0.10-0.2.el4.ppc", "4AS:devhelp-0:0.10-0.2.el4.src", "4AS:devhelp-0:0.10-0.2.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.2.el4.i386", "4AS:devhelp-devel-0:0.10-0.2.el4.ppc", "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4AS:seamonkey-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-0:1.0.3-0.el4.1.src", "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4Desktop:devhelp-0:0.10-0.2.el4.i386", "4Desktop:devhelp-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-0:0.10-0.2.el4.src", "4Desktop:devhelp-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-0:1.0.3-0.el4.1.src", "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4ES:devhelp-0:0.10-0.2.el4.i386", "4ES:devhelp-0:0.10-0.2.el4.ppc", "4ES:devhelp-0:0.10-0.2.el4.src", "4ES:devhelp-0:0.10-0.2.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.2.el4.i386", "4ES:devhelp-devel-0:0.10-0.2.el4.ppc", "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64", "4ES:seamonkey-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-0:1.0.3-0.el4.1.src", "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4WS:devhelp-0:0.10-0.2.el4.i386", "4WS:devhelp-0:0.10-0.2.el4.ppc", "4WS:devhelp-0:0.10-0.2.el4.src", "4WS:devhelp-0:0.10-0.2.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.2.el4.i386", "4WS:devhelp-devel-0:0.10-0.2.el4.ppc", "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4WS:seamonkey-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-0:1.0.3-0.el4.1.src", "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0609" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2006-2779", "discovery_date": "2006-06-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618114" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox and Thunderbird before 1.5.0.4 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via (1) nested \u003coption\u003e tags in a select tag, (2) a DOMNodeRemoved mutation event, (3) \"Content-implemented tree views,\" (4) BoxObjects, (5) the XBL implementation, (6) an iframe that attempts to remove itself, which leads to memory corruption.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:devhelp-0:0.10-0.2.el4.i386", "4AS:devhelp-0:0.10-0.2.el4.ppc", "4AS:devhelp-0:0.10-0.2.el4.src", "4AS:devhelp-0:0.10-0.2.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.2.el4.i386", "4AS:devhelp-devel-0:0.10-0.2.el4.ppc", "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4AS:seamonkey-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-0:1.0.3-0.el4.1.src", "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4Desktop:devhelp-0:0.10-0.2.el4.i386", "4Desktop:devhelp-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-0:0.10-0.2.el4.src", "4Desktop:devhelp-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-0:1.0.3-0.el4.1.src", "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4ES:devhelp-0:0.10-0.2.el4.i386", "4ES:devhelp-0:0.10-0.2.el4.ppc", "4ES:devhelp-0:0.10-0.2.el4.src", "4ES:devhelp-0:0.10-0.2.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.2.el4.i386", "4ES:devhelp-devel-0:0.10-0.2.el4.ppc", "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64", "4ES:seamonkey-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-0:1.0.3-0.el4.1.src", "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4WS:devhelp-0:0.10-0.2.el4.i386", "4WS:devhelp-0:0.10-0.2.el4.ppc", "4WS:devhelp-0:0.10-0.2.el4.src", "4WS:devhelp-0:0.10-0.2.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.2.el4.i386", "4WS:devhelp-devel-0:0.10-0.2.el4.ppc", "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4WS:seamonkey-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-0:1.0.3-0.el4.1.src", "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2779" }, { "category": "external", "summary": "RHBZ#1618114", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618114" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2779", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2779" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2779", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2779" } ], "release_date": "2006-06-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-08-02T18:39:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nMultilib systems may experience difficulty if trying to specify the package\nby name to the Update Agent via a command line argument. This can be\nsolved by executing the following commands:\n\nup2date seamonkey; up2date seamonkey-nss seamonkey-nspr", "product_ids": [ "4AS:devhelp-0:0.10-0.2.el4.i386", "4AS:devhelp-0:0.10-0.2.el4.ppc", "4AS:devhelp-0:0.10-0.2.el4.src", "4AS:devhelp-0:0.10-0.2.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.2.el4.i386", "4AS:devhelp-devel-0:0.10-0.2.el4.ppc", "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4AS:seamonkey-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-0:1.0.3-0.el4.1.src", "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4Desktop:devhelp-0:0.10-0.2.el4.i386", "4Desktop:devhelp-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-0:0.10-0.2.el4.src", "4Desktop:devhelp-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-0:1.0.3-0.el4.1.src", "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4ES:devhelp-0:0.10-0.2.el4.i386", "4ES:devhelp-0:0.10-0.2.el4.ppc", "4ES:devhelp-0:0.10-0.2.el4.src", "4ES:devhelp-0:0.10-0.2.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.2.el4.i386", "4ES:devhelp-devel-0:0.10-0.2.el4.ppc", "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64", "4ES:seamonkey-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-0:1.0.3-0.el4.1.src", "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4WS:devhelp-0:0.10-0.2.el4.i386", "4WS:devhelp-0:0.10-0.2.el4.ppc", "4WS:devhelp-0:0.10-0.2.el4.src", "4WS:devhelp-0:0.10-0.2.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.2.el4.i386", "4WS:devhelp-devel-0:0.10-0.2.el4.ppc", "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4WS:seamonkey-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-0:1.0.3-0.el4.1.src", "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0609" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-2780", "discovery_date": "2006-06-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618115" } ], "notes": [ { "category": "description", "text": "Integer overflow in Mozilla Firefox and Thunderbird before 1.5.0.4 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via \"jsstr tagify,\" which leads to memory corruption.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:devhelp-0:0.10-0.2.el4.i386", "4AS:devhelp-0:0.10-0.2.el4.ppc", "4AS:devhelp-0:0.10-0.2.el4.src", "4AS:devhelp-0:0.10-0.2.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.2.el4.i386", "4AS:devhelp-devel-0:0.10-0.2.el4.ppc", "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4AS:seamonkey-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-0:1.0.3-0.el4.1.src", "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4Desktop:devhelp-0:0.10-0.2.el4.i386", "4Desktop:devhelp-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-0:0.10-0.2.el4.src", "4Desktop:devhelp-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-0:1.0.3-0.el4.1.src", "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4ES:devhelp-0:0.10-0.2.el4.i386", "4ES:devhelp-0:0.10-0.2.el4.ppc", "4ES:devhelp-0:0.10-0.2.el4.src", "4ES:devhelp-0:0.10-0.2.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.2.el4.i386", "4ES:devhelp-devel-0:0.10-0.2.el4.ppc", "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64", "4ES:seamonkey-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-0:1.0.3-0.el4.1.src", "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4WS:devhelp-0:0.10-0.2.el4.i386", "4WS:devhelp-0:0.10-0.2.el4.ppc", "4WS:devhelp-0:0.10-0.2.el4.src", "4WS:devhelp-0:0.10-0.2.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.2.el4.i386", "4WS:devhelp-devel-0:0.10-0.2.el4.ppc", "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4WS:seamonkey-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-0:1.0.3-0.el4.1.src", "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2780" }, { "category": "external", "summary": "RHBZ#1618115", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618115" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2780", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2780" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2780", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2780" } ], "release_date": "2006-06-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-08-02T18:39:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nMultilib systems may experience difficulty if trying to specify the package\nby name to the Update Agent via a command line argument. This can be\nsolved by executing the following commands:\n\nup2date seamonkey; up2date seamonkey-nss seamonkey-nspr", "product_ids": [ "4AS:devhelp-0:0.10-0.2.el4.i386", "4AS:devhelp-0:0.10-0.2.el4.ppc", "4AS:devhelp-0:0.10-0.2.el4.src", "4AS:devhelp-0:0.10-0.2.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.2.el4.i386", "4AS:devhelp-devel-0:0.10-0.2.el4.ppc", "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4AS:seamonkey-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-0:1.0.3-0.el4.1.src", "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4Desktop:devhelp-0:0.10-0.2.el4.i386", "4Desktop:devhelp-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-0:0.10-0.2.el4.src", "4Desktop:devhelp-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-0:1.0.3-0.el4.1.src", "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4ES:devhelp-0:0.10-0.2.el4.i386", "4ES:devhelp-0:0.10-0.2.el4.ppc", "4ES:devhelp-0:0.10-0.2.el4.src", "4ES:devhelp-0:0.10-0.2.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.2.el4.i386", "4ES:devhelp-devel-0:0.10-0.2.el4.ppc", "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64", "4ES:seamonkey-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-0:1.0.3-0.el4.1.src", "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4WS:devhelp-0:0.10-0.2.el4.i386", "4WS:devhelp-0:0.10-0.2.el4.ppc", "4WS:devhelp-0:0.10-0.2.el4.src", "4WS:devhelp-0:0.10-0.2.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.2.el4.i386", "4WS:devhelp-devel-0:0.10-0.2.el4.ppc", "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4WS:seamonkey-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-0:1.0.3-0.el4.1.src", "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0609" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-2781", "discovery_date": "2006-06-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "193963" } ], "notes": [ { "category": "description", "text": "Double free vulnerability in nsVCard.cpp in Mozilla Thunderbird before 1.5.0.4 and SeaMonkey before 1.0.2 allows remote attackers to cause a denial of service (hang) and possibly execute arbitrary code via a VCard that contains invalid base64 characters.", "title": "Vulnerability description" }, { "category": "summary", "text": "(seamonkey): DOS/arbitrary code execution vuln with vcards", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:devhelp-0:0.10-0.2.el4.i386", "4AS:devhelp-0:0.10-0.2.el4.ppc", "4AS:devhelp-0:0.10-0.2.el4.src", "4AS:devhelp-0:0.10-0.2.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.2.el4.i386", "4AS:devhelp-devel-0:0.10-0.2.el4.ppc", "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4AS:seamonkey-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-0:1.0.3-0.el4.1.src", "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4Desktop:devhelp-0:0.10-0.2.el4.i386", "4Desktop:devhelp-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-0:0.10-0.2.el4.src", "4Desktop:devhelp-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-0:1.0.3-0.el4.1.src", "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4ES:devhelp-0:0.10-0.2.el4.i386", "4ES:devhelp-0:0.10-0.2.el4.ppc", "4ES:devhelp-0:0.10-0.2.el4.src", "4ES:devhelp-0:0.10-0.2.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.2.el4.i386", "4ES:devhelp-devel-0:0.10-0.2.el4.ppc", "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64", "4ES:seamonkey-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-0:1.0.3-0.el4.1.src", "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4WS:devhelp-0:0.10-0.2.el4.i386", "4WS:devhelp-0:0.10-0.2.el4.ppc", "4WS:devhelp-0:0.10-0.2.el4.src", "4WS:devhelp-0:0.10-0.2.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.2.el4.i386", "4WS:devhelp-devel-0:0.10-0.2.el4.ppc", "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4WS:seamonkey-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-0:1.0.3-0.el4.1.src", "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2781" }, { "category": "external", "summary": "RHBZ#193963", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=193963" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2781", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2781" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2781", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2781" } ], "release_date": "2006-06-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-08-02T18:39:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nMultilib systems may experience difficulty if trying to specify the package\nby name to the Update Agent via a command line argument. This can be\nsolved by executing the following commands:\n\nup2date seamonkey; up2date seamonkey-nss seamonkey-nspr", "product_ids": [ "4AS:devhelp-0:0.10-0.2.el4.i386", "4AS:devhelp-0:0.10-0.2.el4.ppc", "4AS:devhelp-0:0.10-0.2.el4.src", "4AS:devhelp-0:0.10-0.2.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.2.el4.i386", "4AS:devhelp-devel-0:0.10-0.2.el4.ppc", "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4AS:seamonkey-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-0:1.0.3-0.el4.1.src", "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4Desktop:devhelp-0:0.10-0.2.el4.i386", "4Desktop:devhelp-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-0:0.10-0.2.el4.src", "4Desktop:devhelp-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-0:1.0.3-0.el4.1.src", "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4ES:devhelp-0:0.10-0.2.el4.i386", "4ES:devhelp-0:0.10-0.2.el4.ppc", "4ES:devhelp-0:0.10-0.2.el4.src", "4ES:devhelp-0:0.10-0.2.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.2.el4.i386", "4ES:devhelp-devel-0:0.10-0.2.el4.ppc", "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64", "4ES:seamonkey-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-0:1.0.3-0.el4.1.src", "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4WS:devhelp-0:0.10-0.2.el4.i386", "4WS:devhelp-0:0.10-0.2.el4.ppc", "4WS:devhelp-0:0.10-0.2.el4.src", "4WS:devhelp-0:0.10-0.2.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.2.el4.i386", "4WS:devhelp-devel-0:0.10-0.2.el4.ppc", "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4WS:seamonkey-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-0:1.0.3-0.el4.1.src", "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0609" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "(seamonkey): DOS/arbitrary code execution vuln with vcards" }, { "cve": "CVE-2006-2782", "discovery_date": "2006-05-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618116" } ], "notes": [ { "category": "description", "text": "Firefox 1.5.0.2 does not fix all test cases associated with CVE-2006-1729, which allows remote attackers to read arbitrary files by inserting the target filename into a text box, then turning that box into a file upload control.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:devhelp-0:0.10-0.2.el4.i386", "4AS:devhelp-0:0.10-0.2.el4.ppc", "4AS:devhelp-0:0.10-0.2.el4.src", "4AS:devhelp-0:0.10-0.2.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.2.el4.i386", "4AS:devhelp-devel-0:0.10-0.2.el4.ppc", "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4AS:seamonkey-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-0:1.0.3-0.el4.1.src", "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4Desktop:devhelp-0:0.10-0.2.el4.i386", "4Desktop:devhelp-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-0:0.10-0.2.el4.src", "4Desktop:devhelp-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-0:1.0.3-0.el4.1.src", "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4ES:devhelp-0:0.10-0.2.el4.i386", "4ES:devhelp-0:0.10-0.2.el4.ppc", "4ES:devhelp-0:0.10-0.2.el4.src", "4ES:devhelp-0:0.10-0.2.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.2.el4.i386", "4ES:devhelp-devel-0:0.10-0.2.el4.ppc", "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64", "4ES:seamonkey-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-0:1.0.3-0.el4.1.src", "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4WS:devhelp-0:0.10-0.2.el4.i386", "4WS:devhelp-0:0.10-0.2.el4.ppc", "4WS:devhelp-0:0.10-0.2.el4.src", "4WS:devhelp-0:0.10-0.2.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.2.el4.i386", "4WS:devhelp-devel-0:0.10-0.2.el4.ppc", "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4WS:seamonkey-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-0:1.0.3-0.el4.1.src", "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2782" }, { "category": "external", "summary": "RHBZ#1618116", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618116" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2782", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2782" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2782", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2782" } ], "release_date": "2006-06-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-08-02T18:39:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nMultilib systems may experience difficulty if trying to specify the package\nby name to the Update Agent via a command line argument. This can be\nsolved by executing the following commands:\n\nup2date seamonkey; up2date seamonkey-nss seamonkey-nspr", "product_ids": [ "4AS:devhelp-0:0.10-0.2.el4.i386", "4AS:devhelp-0:0.10-0.2.el4.ppc", "4AS:devhelp-0:0.10-0.2.el4.src", "4AS:devhelp-0:0.10-0.2.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.2.el4.i386", "4AS:devhelp-devel-0:0.10-0.2.el4.ppc", "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4AS:seamonkey-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-0:1.0.3-0.el4.1.src", "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4Desktop:devhelp-0:0.10-0.2.el4.i386", "4Desktop:devhelp-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-0:0.10-0.2.el4.src", "4Desktop:devhelp-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-0:1.0.3-0.el4.1.src", "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4ES:devhelp-0:0.10-0.2.el4.i386", "4ES:devhelp-0:0.10-0.2.el4.ppc", "4ES:devhelp-0:0.10-0.2.el4.src", "4ES:devhelp-0:0.10-0.2.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.2.el4.i386", "4ES:devhelp-devel-0:0.10-0.2.el4.ppc", "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64", "4ES:seamonkey-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-0:1.0.3-0.el4.1.src", "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4WS:devhelp-0:0.10-0.2.el4.i386", "4WS:devhelp-0:0.10-0.2.el4.ppc", "4WS:devhelp-0:0.10-0.2.el4.src", "4WS:devhelp-0:0.10-0.2.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.2.el4.i386", "4WS:devhelp-devel-0:0.10-0.2.el4.ppc", "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4WS:seamonkey-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-0:1.0.3-0.el4.1.src", "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0609" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2006-2783", "discovery_date": "2006-05-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618117" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox and Thunderbird before 1.5.0.4 strip the Unicode Byte-order-Mark (BOM) from a UTF-8 page before the page is passed to the parser, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a BOM sequence in the middle of a dangerous tag such as SCRIPT.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:devhelp-0:0.10-0.2.el4.i386", "4AS:devhelp-0:0.10-0.2.el4.ppc", "4AS:devhelp-0:0.10-0.2.el4.src", "4AS:devhelp-0:0.10-0.2.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.2.el4.i386", "4AS:devhelp-devel-0:0.10-0.2.el4.ppc", "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4AS:seamonkey-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-0:1.0.3-0.el4.1.src", "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4Desktop:devhelp-0:0.10-0.2.el4.i386", "4Desktop:devhelp-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-0:0.10-0.2.el4.src", "4Desktop:devhelp-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-0:1.0.3-0.el4.1.src", "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4ES:devhelp-0:0.10-0.2.el4.i386", "4ES:devhelp-0:0.10-0.2.el4.ppc", "4ES:devhelp-0:0.10-0.2.el4.src", "4ES:devhelp-0:0.10-0.2.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.2.el4.i386", "4ES:devhelp-devel-0:0.10-0.2.el4.ppc", "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64", "4ES:seamonkey-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-0:1.0.3-0.el4.1.src", "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4WS:devhelp-0:0.10-0.2.el4.i386", "4WS:devhelp-0:0.10-0.2.el4.ppc", "4WS:devhelp-0:0.10-0.2.el4.src", "4WS:devhelp-0:0.10-0.2.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.2.el4.i386", "4WS:devhelp-devel-0:0.10-0.2.el4.ppc", "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4WS:seamonkey-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-0:1.0.3-0.el4.1.src", "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2783" }, { "category": "external", "summary": "RHBZ#1618117", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618117" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2783", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2783" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2783", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2783" } ], "release_date": "2006-06-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-08-02T18:39:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nMultilib systems may experience difficulty if trying to specify the package\nby name to the Update Agent via a command line argument. This can be\nsolved by executing the following commands:\n\nup2date seamonkey; up2date seamonkey-nss seamonkey-nspr", "product_ids": [ "4AS:devhelp-0:0.10-0.2.el4.i386", "4AS:devhelp-0:0.10-0.2.el4.ppc", "4AS:devhelp-0:0.10-0.2.el4.src", "4AS:devhelp-0:0.10-0.2.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.2.el4.i386", "4AS:devhelp-devel-0:0.10-0.2.el4.ppc", "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4AS:seamonkey-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-0:1.0.3-0.el4.1.src", "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4Desktop:devhelp-0:0.10-0.2.el4.i386", "4Desktop:devhelp-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-0:0.10-0.2.el4.src", "4Desktop:devhelp-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-0:1.0.3-0.el4.1.src", "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4ES:devhelp-0:0.10-0.2.el4.i386", "4ES:devhelp-0:0.10-0.2.el4.ppc", "4ES:devhelp-0:0.10-0.2.el4.src", "4ES:devhelp-0:0.10-0.2.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.2.el4.i386", "4ES:devhelp-devel-0:0.10-0.2.el4.ppc", "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64", "4ES:seamonkey-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-0:1.0.3-0.el4.1.src", "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4WS:devhelp-0:0.10-0.2.el4.i386", "4WS:devhelp-0:0.10-0.2.el4.ppc", "4WS:devhelp-0:0.10-0.2.el4.src", "4WS:devhelp-0:0.10-0.2.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.2.el4.i386", "4WS:devhelp-devel-0:0.10-0.2.el4.ppc", "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4WS:seamonkey-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-0:1.0.3-0.el4.1.src", "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0609" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2006-2784", "discovery_date": "2006-05-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618118" } ], "notes": [ { "category": "description", "text": "The PLUGINSPAGE functionality in Mozilla Firefox before 1.5.0.4 allows remote user-assisted attackers to execute privileged code by tricking a user into installing missing plugins and selecting the \"Manual Install\" button, then using nested javascript: URLs. NOTE: the manual install button is used for downloading software from a remote web site, so this issue would not cross privilege boundaries if the user progresses to the point of installing malicious software from the attacker-controlled site.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:devhelp-0:0.10-0.2.el4.i386", "4AS:devhelp-0:0.10-0.2.el4.ppc", "4AS:devhelp-0:0.10-0.2.el4.src", "4AS:devhelp-0:0.10-0.2.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.2.el4.i386", "4AS:devhelp-devel-0:0.10-0.2.el4.ppc", "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4AS:seamonkey-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-0:1.0.3-0.el4.1.src", "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4Desktop:devhelp-0:0.10-0.2.el4.i386", "4Desktop:devhelp-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-0:0.10-0.2.el4.src", "4Desktop:devhelp-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-0:1.0.3-0.el4.1.src", "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4ES:devhelp-0:0.10-0.2.el4.i386", "4ES:devhelp-0:0.10-0.2.el4.ppc", "4ES:devhelp-0:0.10-0.2.el4.src", "4ES:devhelp-0:0.10-0.2.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.2.el4.i386", "4ES:devhelp-devel-0:0.10-0.2.el4.ppc", "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64", "4ES:seamonkey-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-0:1.0.3-0.el4.1.src", "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4WS:devhelp-0:0.10-0.2.el4.i386", "4WS:devhelp-0:0.10-0.2.el4.ppc", "4WS:devhelp-0:0.10-0.2.el4.src", "4WS:devhelp-0:0.10-0.2.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.2.el4.i386", "4WS:devhelp-devel-0:0.10-0.2.el4.ppc", "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4WS:seamonkey-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-0:1.0.3-0.el4.1.src", "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2784" }, { "category": "external", "summary": "RHBZ#1618118", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618118" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2784", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2784" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2784", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2784" } ], "release_date": "2006-06-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-08-02T18:39:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nMultilib systems may experience difficulty if trying to specify the package\nby name to the Update Agent via a command line argument. This can be\nsolved by executing the following commands:\n\nup2date seamonkey; up2date seamonkey-nss seamonkey-nspr", "product_ids": [ "4AS:devhelp-0:0.10-0.2.el4.i386", "4AS:devhelp-0:0.10-0.2.el4.ppc", "4AS:devhelp-0:0.10-0.2.el4.src", "4AS:devhelp-0:0.10-0.2.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.2.el4.i386", "4AS:devhelp-devel-0:0.10-0.2.el4.ppc", "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4AS:seamonkey-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-0:1.0.3-0.el4.1.src", "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4Desktop:devhelp-0:0.10-0.2.el4.i386", "4Desktop:devhelp-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-0:0.10-0.2.el4.src", "4Desktop:devhelp-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-0:1.0.3-0.el4.1.src", "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4ES:devhelp-0:0.10-0.2.el4.i386", "4ES:devhelp-0:0.10-0.2.el4.ppc", "4ES:devhelp-0:0.10-0.2.el4.src", "4ES:devhelp-0:0.10-0.2.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.2.el4.i386", "4ES:devhelp-devel-0:0.10-0.2.el4.ppc", "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64", "4ES:seamonkey-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-0:1.0.3-0.el4.1.src", "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4WS:devhelp-0:0.10-0.2.el4.i386", "4WS:devhelp-0:0.10-0.2.el4.ppc", "4WS:devhelp-0:0.10-0.2.el4.src", "4WS:devhelp-0:0.10-0.2.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.2.el4.i386", "4WS:devhelp-devel-0:0.10-0.2.el4.ppc", "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4WS:seamonkey-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-0:1.0.3-0.el4.1.src", "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0609" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2006-2785", "discovery_date": "2006-05-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618119" } ], "notes": [ { "category": "description", "text": "Cross-site scripting (XSS) vulnerability in Mozilla Firefox before 1.5.0.4 allows user-assisted remote attackers to inject arbitrary web script or HTML by tricking a user into (1) performing a \"View Image\" on a broken image in which the SRC attribute contains a Javascript URL, or (2) selecting \"Show only this frame\" on a frame whose SRC attribute contains a Javascript URL.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:devhelp-0:0.10-0.2.el4.i386", "4AS:devhelp-0:0.10-0.2.el4.ppc", "4AS:devhelp-0:0.10-0.2.el4.src", "4AS:devhelp-0:0.10-0.2.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.2.el4.i386", "4AS:devhelp-devel-0:0.10-0.2.el4.ppc", "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4AS:seamonkey-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-0:1.0.3-0.el4.1.src", "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4Desktop:devhelp-0:0.10-0.2.el4.i386", "4Desktop:devhelp-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-0:0.10-0.2.el4.src", "4Desktop:devhelp-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-0:1.0.3-0.el4.1.src", "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4ES:devhelp-0:0.10-0.2.el4.i386", "4ES:devhelp-0:0.10-0.2.el4.ppc", "4ES:devhelp-0:0.10-0.2.el4.src", "4ES:devhelp-0:0.10-0.2.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.2.el4.i386", "4ES:devhelp-devel-0:0.10-0.2.el4.ppc", "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64", "4ES:seamonkey-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-0:1.0.3-0.el4.1.src", "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4WS:devhelp-0:0.10-0.2.el4.i386", "4WS:devhelp-0:0.10-0.2.el4.ppc", "4WS:devhelp-0:0.10-0.2.el4.src", "4WS:devhelp-0:0.10-0.2.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.2.el4.i386", "4WS:devhelp-devel-0:0.10-0.2.el4.ppc", "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4WS:seamonkey-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-0:1.0.3-0.el4.1.src", "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2785" }, { "category": "external", "summary": "RHBZ#1618119", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618119" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2785", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2785" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2785", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2785" } ], "release_date": "2006-06-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-08-02T18:39:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nMultilib systems may experience difficulty if trying to specify the package\nby name to the Update Agent via a command line argument. This can be\nsolved by executing the following commands:\n\nup2date seamonkey; up2date seamonkey-nss seamonkey-nspr", "product_ids": [ "4AS:devhelp-0:0.10-0.2.el4.i386", "4AS:devhelp-0:0.10-0.2.el4.ppc", "4AS:devhelp-0:0.10-0.2.el4.src", "4AS:devhelp-0:0.10-0.2.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.2.el4.i386", "4AS:devhelp-devel-0:0.10-0.2.el4.ppc", "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4AS:seamonkey-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-0:1.0.3-0.el4.1.src", "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4Desktop:devhelp-0:0.10-0.2.el4.i386", "4Desktop:devhelp-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-0:0.10-0.2.el4.src", "4Desktop:devhelp-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-0:1.0.3-0.el4.1.src", "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4ES:devhelp-0:0.10-0.2.el4.i386", "4ES:devhelp-0:0.10-0.2.el4.ppc", "4ES:devhelp-0:0.10-0.2.el4.src", "4ES:devhelp-0:0.10-0.2.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.2.el4.i386", "4ES:devhelp-devel-0:0.10-0.2.el4.ppc", "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64", "4ES:seamonkey-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-0:1.0.3-0.el4.1.src", "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4WS:devhelp-0:0.10-0.2.el4.i386", "4WS:devhelp-0:0.10-0.2.el4.ppc", "4WS:devhelp-0:0.10-0.2.el4.src", "4WS:devhelp-0:0.10-0.2.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.2.el4.i386", "4WS:devhelp-devel-0:0.10-0.2.el4.ppc", "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4WS:seamonkey-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-0:1.0.3-0.el4.1.src", "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0609" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2006-2786", "discovery_date": "2006-05-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618120" } ], "notes": [ { "category": "description", "text": "HTTP response smuggling vulnerability in Mozilla Firefox and Thunderbird before 1.5.0.4, when used with certain proxy servers, allows remote attackers to cause Firefox to interpret certain responses as if they were responses from two different sites via (1) invalid HTTP response headers with spaces between the header name and the colon, which might not be ignored in some cases, or (2) HTTP 1.1 headers through an HTTP 1.0 proxy, which are ignored by the proxy but processed by the client.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:devhelp-0:0.10-0.2.el4.i386", "4AS:devhelp-0:0.10-0.2.el4.ppc", "4AS:devhelp-0:0.10-0.2.el4.src", "4AS:devhelp-0:0.10-0.2.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.2.el4.i386", "4AS:devhelp-devel-0:0.10-0.2.el4.ppc", "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4AS:seamonkey-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-0:1.0.3-0.el4.1.src", "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4Desktop:devhelp-0:0.10-0.2.el4.i386", "4Desktop:devhelp-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-0:0.10-0.2.el4.src", "4Desktop:devhelp-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-0:1.0.3-0.el4.1.src", "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4ES:devhelp-0:0.10-0.2.el4.i386", "4ES:devhelp-0:0.10-0.2.el4.ppc", "4ES:devhelp-0:0.10-0.2.el4.src", "4ES:devhelp-0:0.10-0.2.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.2.el4.i386", "4ES:devhelp-devel-0:0.10-0.2.el4.ppc", "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64", "4ES:seamonkey-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-0:1.0.3-0.el4.1.src", "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4WS:devhelp-0:0.10-0.2.el4.i386", "4WS:devhelp-0:0.10-0.2.el4.ppc", "4WS:devhelp-0:0.10-0.2.el4.src", "4WS:devhelp-0:0.10-0.2.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.2.el4.i386", "4WS:devhelp-devel-0:0.10-0.2.el4.ppc", "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4WS:seamonkey-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-0:1.0.3-0.el4.1.src", "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2786" }, { "category": "external", "summary": "RHBZ#1618120", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618120" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2786", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2786" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2786", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2786" } ], "release_date": "2006-06-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-08-02T18:39:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nMultilib systems may experience difficulty if trying to specify the package\nby name to the Update Agent via a command line argument. This can be\nsolved by executing the following commands:\n\nup2date seamonkey; up2date seamonkey-nss seamonkey-nspr", "product_ids": [ "4AS:devhelp-0:0.10-0.2.el4.i386", "4AS:devhelp-0:0.10-0.2.el4.ppc", "4AS:devhelp-0:0.10-0.2.el4.src", "4AS:devhelp-0:0.10-0.2.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.2.el4.i386", "4AS:devhelp-devel-0:0.10-0.2.el4.ppc", "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4AS:seamonkey-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-0:1.0.3-0.el4.1.src", "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4Desktop:devhelp-0:0.10-0.2.el4.i386", "4Desktop:devhelp-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-0:0.10-0.2.el4.src", "4Desktop:devhelp-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-0:1.0.3-0.el4.1.src", "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4ES:devhelp-0:0.10-0.2.el4.i386", "4ES:devhelp-0:0.10-0.2.el4.ppc", "4ES:devhelp-0:0.10-0.2.el4.src", "4ES:devhelp-0:0.10-0.2.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.2.el4.i386", "4ES:devhelp-devel-0:0.10-0.2.el4.ppc", "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64", "4ES:seamonkey-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-0:1.0.3-0.el4.1.src", "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4WS:devhelp-0:0.10-0.2.el4.i386", "4WS:devhelp-0:0.10-0.2.el4.ppc", "4WS:devhelp-0:0.10-0.2.el4.src", "4WS:devhelp-0:0.10-0.2.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.2.el4.i386", "4WS:devhelp-devel-0:0.10-0.2.el4.ppc", "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4WS:seamonkey-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-0:1.0.3-0.el4.1.src", "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0609" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2006-2787", "discovery_date": "2006-05-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618121" } ], "notes": [ { "category": "description", "text": "EvalInSandbox in Mozilla Firefox and Thunderbird before 1.5.0.4 allows remote attackers to gain privileges via javascript that calls the valueOf method on objects that were created outside of the sandbox.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:devhelp-0:0.10-0.2.el4.i386", "4AS:devhelp-0:0.10-0.2.el4.ppc", "4AS:devhelp-0:0.10-0.2.el4.src", "4AS:devhelp-0:0.10-0.2.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.2.el4.i386", "4AS:devhelp-devel-0:0.10-0.2.el4.ppc", "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4AS:seamonkey-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-0:1.0.3-0.el4.1.src", "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4Desktop:devhelp-0:0.10-0.2.el4.i386", "4Desktop:devhelp-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-0:0.10-0.2.el4.src", "4Desktop:devhelp-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-0:1.0.3-0.el4.1.src", "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4ES:devhelp-0:0.10-0.2.el4.i386", "4ES:devhelp-0:0.10-0.2.el4.ppc", "4ES:devhelp-0:0.10-0.2.el4.src", "4ES:devhelp-0:0.10-0.2.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.2.el4.i386", "4ES:devhelp-devel-0:0.10-0.2.el4.ppc", "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64", "4ES:seamonkey-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-0:1.0.3-0.el4.1.src", "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4WS:devhelp-0:0.10-0.2.el4.i386", "4WS:devhelp-0:0.10-0.2.el4.ppc", "4WS:devhelp-0:0.10-0.2.el4.src", "4WS:devhelp-0:0.10-0.2.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.2.el4.i386", "4WS:devhelp-devel-0:0.10-0.2.el4.ppc", "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4WS:seamonkey-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-0:1.0.3-0.el4.1.src", "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2787" }, { "category": "external", "summary": "RHBZ#1618121", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618121" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2787", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2787" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2787", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2787" } ], "release_date": "2006-06-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-08-02T18:39:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nMultilib systems may experience difficulty if trying to specify the package\nby name to the Update Agent via a command line argument. This can be\nsolved by executing the following commands:\n\nup2date seamonkey; up2date seamonkey-nss seamonkey-nspr", "product_ids": [ "4AS:devhelp-0:0.10-0.2.el4.i386", "4AS:devhelp-0:0.10-0.2.el4.ppc", "4AS:devhelp-0:0.10-0.2.el4.src", "4AS:devhelp-0:0.10-0.2.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.2.el4.i386", "4AS:devhelp-devel-0:0.10-0.2.el4.ppc", "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4AS:seamonkey-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-0:1.0.3-0.el4.1.src", "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4Desktop:devhelp-0:0.10-0.2.el4.i386", "4Desktop:devhelp-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-0:0.10-0.2.el4.src", "4Desktop:devhelp-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-0:1.0.3-0.el4.1.src", "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4ES:devhelp-0:0.10-0.2.el4.i386", "4ES:devhelp-0:0.10-0.2.el4.ppc", "4ES:devhelp-0:0.10-0.2.el4.src", "4ES:devhelp-0:0.10-0.2.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.2.el4.i386", "4ES:devhelp-devel-0:0.10-0.2.el4.ppc", "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64", "4ES:seamonkey-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-0:1.0.3-0.el4.1.src", "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4WS:devhelp-0:0.10-0.2.el4.i386", "4WS:devhelp-0:0.10-0.2.el4.ppc", "4WS:devhelp-0:0.10-0.2.el4.src", "4WS:devhelp-0:0.10-0.2.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.2.el4.i386", "4WS:devhelp-devel-0:0.10-0.2.el4.ppc", "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4WS:seamonkey-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-0:1.0.3-0.el4.1.src", "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0609" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2006-2788", "discovery_date": "2006-05-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618122" } ], "notes": [ { "category": "description", "text": "Double free vulnerability in the getRawDER function for nsIX509Cert in Firefox allows remote attackers to cause a denial of service (hang) and possibly execute arbitrary code via certain Javascript code.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:devhelp-0:0.10-0.2.el4.i386", "4AS:devhelp-0:0.10-0.2.el4.ppc", "4AS:devhelp-0:0.10-0.2.el4.src", "4AS:devhelp-0:0.10-0.2.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.2.el4.i386", "4AS:devhelp-devel-0:0.10-0.2.el4.ppc", "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4AS:seamonkey-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-0:1.0.3-0.el4.1.src", "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4Desktop:devhelp-0:0.10-0.2.el4.i386", "4Desktop:devhelp-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-0:0.10-0.2.el4.src", "4Desktop:devhelp-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-0:1.0.3-0.el4.1.src", "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4ES:devhelp-0:0.10-0.2.el4.i386", "4ES:devhelp-0:0.10-0.2.el4.ppc", "4ES:devhelp-0:0.10-0.2.el4.src", "4ES:devhelp-0:0.10-0.2.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.2.el4.i386", "4ES:devhelp-devel-0:0.10-0.2.el4.ppc", "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64", "4ES:seamonkey-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-0:1.0.3-0.el4.1.src", "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4WS:devhelp-0:0.10-0.2.el4.i386", "4WS:devhelp-0:0.10-0.2.el4.ppc", "4WS:devhelp-0:0.10-0.2.el4.src", "4WS:devhelp-0:0.10-0.2.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.2.el4.i386", "4WS:devhelp-devel-0:0.10-0.2.el4.ppc", "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4WS:seamonkey-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-0:1.0.3-0.el4.1.src", "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2788" }, { "category": "external", "summary": "RHBZ#1618122", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618122" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2788", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2788" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2788", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2788" } ], "release_date": "2006-06-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-08-02T18:39:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nMultilib systems may experience difficulty if trying to specify the package\nby name to the Update Agent via a command line argument. This can be\nsolved by executing the following commands:\n\nup2date seamonkey; up2date seamonkey-nss seamonkey-nspr", "product_ids": [ "4AS:devhelp-0:0.10-0.2.el4.i386", "4AS:devhelp-0:0.10-0.2.el4.ppc", "4AS:devhelp-0:0.10-0.2.el4.src", "4AS:devhelp-0:0.10-0.2.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.2.el4.i386", "4AS:devhelp-devel-0:0.10-0.2.el4.ppc", "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4AS:seamonkey-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-0:1.0.3-0.el4.1.src", "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4Desktop:devhelp-0:0.10-0.2.el4.i386", "4Desktop:devhelp-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-0:0.10-0.2.el4.src", "4Desktop:devhelp-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-0:1.0.3-0.el4.1.src", "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4ES:devhelp-0:0.10-0.2.el4.i386", "4ES:devhelp-0:0.10-0.2.el4.ppc", "4ES:devhelp-0:0.10-0.2.el4.src", "4ES:devhelp-0:0.10-0.2.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.2.el4.i386", "4ES:devhelp-devel-0:0.10-0.2.el4.ppc", "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64", "4ES:seamonkey-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-0:1.0.3-0.el4.1.src", "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4WS:devhelp-0:0.10-0.2.el4.i386", "4WS:devhelp-0:0.10-0.2.el4.ppc", "4WS:devhelp-0:0.10-0.2.el4.src", "4WS:devhelp-0:0.10-0.2.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.2.el4.i386", "4WS:devhelp-devel-0:0.10-0.2.el4.ppc", "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4WS:seamonkey-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-0:1.0.3-0.el4.1.src", "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0609" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2006-3113", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618135" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox 1.5 before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via simultaneous XPCOM events, which causes a timer object to be deleted in a way that triggers memory corruption.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:devhelp-0:0.10-0.2.el4.i386", "4AS:devhelp-0:0.10-0.2.el4.ppc", "4AS:devhelp-0:0.10-0.2.el4.src", "4AS:devhelp-0:0.10-0.2.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.2.el4.i386", "4AS:devhelp-devel-0:0.10-0.2.el4.ppc", "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4AS:seamonkey-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-0:1.0.3-0.el4.1.src", "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4Desktop:devhelp-0:0.10-0.2.el4.i386", "4Desktop:devhelp-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-0:0.10-0.2.el4.src", "4Desktop:devhelp-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-0:1.0.3-0.el4.1.src", "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4ES:devhelp-0:0.10-0.2.el4.i386", "4ES:devhelp-0:0.10-0.2.el4.ppc", "4ES:devhelp-0:0.10-0.2.el4.src", "4ES:devhelp-0:0.10-0.2.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.2.el4.i386", "4ES:devhelp-devel-0:0.10-0.2.el4.ppc", "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64", "4ES:seamonkey-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-0:1.0.3-0.el4.1.src", "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4WS:devhelp-0:0.10-0.2.el4.i386", "4WS:devhelp-0:0.10-0.2.el4.ppc", "4WS:devhelp-0:0.10-0.2.el4.src", "4WS:devhelp-0:0.10-0.2.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.2.el4.i386", "4WS:devhelp-devel-0:0.10-0.2.el4.ppc", "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4WS:seamonkey-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-0:1.0.3-0.el4.1.src", "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3113" }, { "category": "external", "summary": "RHBZ#1618135", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618135" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3113", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3113" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3113", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3113" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-08-02T18:39:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nMultilib systems may experience difficulty if trying to specify the package\nby name to the Update Agent via a command line argument. This can be\nsolved by executing the following commands:\n\nup2date seamonkey; up2date seamonkey-nss seamonkey-nspr", "product_ids": [ "4AS:devhelp-0:0.10-0.2.el4.i386", "4AS:devhelp-0:0.10-0.2.el4.ppc", "4AS:devhelp-0:0.10-0.2.el4.src", "4AS:devhelp-0:0.10-0.2.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.2.el4.i386", "4AS:devhelp-devel-0:0.10-0.2.el4.ppc", "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4AS:seamonkey-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-0:1.0.3-0.el4.1.src", "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4Desktop:devhelp-0:0.10-0.2.el4.i386", "4Desktop:devhelp-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-0:0.10-0.2.el4.src", "4Desktop:devhelp-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-0:1.0.3-0.el4.1.src", "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4ES:devhelp-0:0.10-0.2.el4.i386", "4ES:devhelp-0:0.10-0.2.el4.ppc", "4ES:devhelp-0:0.10-0.2.el4.src", "4ES:devhelp-0:0.10-0.2.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.2.el4.i386", "4ES:devhelp-devel-0:0.10-0.2.el4.ppc", "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64", "4ES:seamonkey-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-0:1.0.3-0.el4.1.src", "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4WS:devhelp-0:0.10-0.2.el4.i386", "4WS:devhelp-0:0.10-0.2.el4.ppc", "4WS:devhelp-0:0.10-0.2.el4.src", "4WS:devhelp-0:0.10-0.2.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.2.el4.i386", "4WS:devhelp-devel-0:0.10-0.2.el4.ppc", "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4WS:seamonkey-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-0:1.0.3-0.el4.1.src", "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0609" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-3677", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618153" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox 1.5 before 1.5.0.5 and SeaMonkey before 1.0.3 allows remote attackers to execute arbitrary code by changing certain properties of the window navigator object (window.navigator) that are accessed when Java starts up, which causes a crash that leads to code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:devhelp-0:0.10-0.2.el4.i386", "4AS:devhelp-0:0.10-0.2.el4.ppc", "4AS:devhelp-0:0.10-0.2.el4.src", "4AS:devhelp-0:0.10-0.2.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.2.el4.i386", "4AS:devhelp-devel-0:0.10-0.2.el4.ppc", "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4AS:seamonkey-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-0:1.0.3-0.el4.1.src", "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4Desktop:devhelp-0:0.10-0.2.el4.i386", "4Desktop:devhelp-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-0:0.10-0.2.el4.src", "4Desktop:devhelp-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-0:1.0.3-0.el4.1.src", "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4ES:devhelp-0:0.10-0.2.el4.i386", "4ES:devhelp-0:0.10-0.2.el4.ppc", "4ES:devhelp-0:0.10-0.2.el4.src", "4ES:devhelp-0:0.10-0.2.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.2.el4.i386", "4ES:devhelp-devel-0:0.10-0.2.el4.ppc", "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64", "4ES:seamonkey-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-0:1.0.3-0.el4.1.src", "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4WS:devhelp-0:0.10-0.2.el4.i386", "4WS:devhelp-0:0.10-0.2.el4.ppc", "4WS:devhelp-0:0.10-0.2.el4.src", "4WS:devhelp-0:0.10-0.2.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.2.el4.i386", "4WS:devhelp-devel-0:0.10-0.2.el4.ppc", "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4WS:seamonkey-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-0:1.0.3-0.el4.1.src", "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3677" }, { "category": "external", "summary": "RHBZ#1618153", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618153" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3677", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3677" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3677", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3677" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-08-02T18:39:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nMultilib systems may experience difficulty if trying to specify the package\nby name to the Update Agent via a command line argument. This can be\nsolved by executing the following commands:\n\nup2date seamonkey; up2date seamonkey-nss seamonkey-nspr", "product_ids": [ "4AS:devhelp-0:0.10-0.2.el4.i386", "4AS:devhelp-0:0.10-0.2.el4.ppc", "4AS:devhelp-0:0.10-0.2.el4.src", "4AS:devhelp-0:0.10-0.2.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.2.el4.i386", "4AS:devhelp-devel-0:0.10-0.2.el4.ppc", "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4AS:seamonkey-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-0:1.0.3-0.el4.1.src", "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4Desktop:devhelp-0:0.10-0.2.el4.i386", "4Desktop:devhelp-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-0:0.10-0.2.el4.src", "4Desktop:devhelp-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-0:1.0.3-0.el4.1.src", "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4ES:devhelp-0:0.10-0.2.el4.i386", "4ES:devhelp-0:0.10-0.2.el4.ppc", "4ES:devhelp-0:0.10-0.2.el4.src", "4ES:devhelp-0:0.10-0.2.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.2.el4.i386", "4ES:devhelp-devel-0:0.10-0.2.el4.ppc", "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64", "4ES:seamonkey-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-0:1.0.3-0.el4.1.src", "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4WS:devhelp-0:0.10-0.2.el4.i386", "4WS:devhelp-0:0.10-0.2.el4.ppc", "4WS:devhelp-0:0.10-0.2.el4.src", "4WS:devhelp-0:0.10-0.2.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.2.el4.i386", "4WS:devhelp-devel-0:0.10-0.2.el4.ppc", "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4WS:seamonkey-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-0:1.0.3-0.el4.1.src", "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0609" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-3801", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618161" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox 1.5 before 1.5.0.5 and SeaMonkey before 1.0.3 does not properly clear a JavaScript reference to a frame or window, which leaves a pointer to a deleted object that allows remote attackers to execute arbitrary native code.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:devhelp-0:0.10-0.2.el4.i386", "4AS:devhelp-0:0.10-0.2.el4.ppc", "4AS:devhelp-0:0.10-0.2.el4.src", "4AS:devhelp-0:0.10-0.2.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.2.el4.i386", "4AS:devhelp-devel-0:0.10-0.2.el4.ppc", "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4AS:seamonkey-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-0:1.0.3-0.el4.1.src", "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4Desktop:devhelp-0:0.10-0.2.el4.i386", "4Desktop:devhelp-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-0:0.10-0.2.el4.src", "4Desktop:devhelp-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-0:1.0.3-0.el4.1.src", "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4ES:devhelp-0:0.10-0.2.el4.i386", "4ES:devhelp-0:0.10-0.2.el4.ppc", "4ES:devhelp-0:0.10-0.2.el4.src", "4ES:devhelp-0:0.10-0.2.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.2.el4.i386", "4ES:devhelp-devel-0:0.10-0.2.el4.ppc", "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64", "4ES:seamonkey-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-0:1.0.3-0.el4.1.src", "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4WS:devhelp-0:0.10-0.2.el4.i386", "4WS:devhelp-0:0.10-0.2.el4.ppc", "4WS:devhelp-0:0.10-0.2.el4.src", "4WS:devhelp-0:0.10-0.2.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.2.el4.i386", "4WS:devhelp-devel-0:0.10-0.2.el4.ppc", "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4WS:seamonkey-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-0:1.0.3-0.el4.1.src", "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3801" }, { "category": "external", "summary": "RHBZ#1618161", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618161" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3801", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3801" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3801", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3801" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-08-02T18:39:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nMultilib systems may experience difficulty if trying to specify the package\nby name to the Update Agent via a command line argument. This can be\nsolved by executing the following commands:\n\nup2date seamonkey; up2date seamonkey-nss seamonkey-nspr", "product_ids": [ "4AS:devhelp-0:0.10-0.2.el4.i386", "4AS:devhelp-0:0.10-0.2.el4.ppc", "4AS:devhelp-0:0.10-0.2.el4.src", "4AS:devhelp-0:0.10-0.2.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.2.el4.i386", "4AS:devhelp-devel-0:0.10-0.2.el4.ppc", "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4AS:seamonkey-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-0:1.0.3-0.el4.1.src", "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4Desktop:devhelp-0:0.10-0.2.el4.i386", "4Desktop:devhelp-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-0:0.10-0.2.el4.src", "4Desktop:devhelp-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-0:1.0.3-0.el4.1.src", "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4ES:devhelp-0:0.10-0.2.el4.i386", "4ES:devhelp-0:0.10-0.2.el4.ppc", "4ES:devhelp-0:0.10-0.2.el4.src", "4ES:devhelp-0:0.10-0.2.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.2.el4.i386", "4ES:devhelp-devel-0:0.10-0.2.el4.ppc", "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64", "4ES:seamonkey-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-0:1.0.3-0.el4.1.src", "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4WS:devhelp-0:0.10-0.2.el4.i386", "4WS:devhelp-0:0.10-0.2.el4.ppc", "4WS:devhelp-0:0.10-0.2.el4.src", "4WS:devhelp-0:0.10-0.2.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.2.el4.i386", "4WS:devhelp-devel-0:0.10-0.2.el4.ppc", "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4WS:seamonkey-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-0:1.0.3-0.el4.1.src", "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0609" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-3802", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618162" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to hijack native DOM methods from objects in another domain and conduct cross-site scripting (XSS) attacks using DOM methods of the top-level object.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:devhelp-0:0.10-0.2.el4.i386", "4AS:devhelp-0:0.10-0.2.el4.ppc", "4AS:devhelp-0:0.10-0.2.el4.src", "4AS:devhelp-0:0.10-0.2.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.2.el4.i386", "4AS:devhelp-devel-0:0.10-0.2.el4.ppc", "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4AS:seamonkey-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-0:1.0.3-0.el4.1.src", "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4Desktop:devhelp-0:0.10-0.2.el4.i386", "4Desktop:devhelp-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-0:0.10-0.2.el4.src", "4Desktop:devhelp-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-0:1.0.3-0.el4.1.src", "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4ES:devhelp-0:0.10-0.2.el4.i386", "4ES:devhelp-0:0.10-0.2.el4.ppc", "4ES:devhelp-0:0.10-0.2.el4.src", "4ES:devhelp-0:0.10-0.2.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.2.el4.i386", "4ES:devhelp-devel-0:0.10-0.2.el4.ppc", "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64", "4ES:seamonkey-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-0:1.0.3-0.el4.1.src", "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4WS:devhelp-0:0.10-0.2.el4.i386", "4WS:devhelp-0:0.10-0.2.el4.ppc", "4WS:devhelp-0:0.10-0.2.el4.src", "4WS:devhelp-0:0.10-0.2.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.2.el4.i386", "4WS:devhelp-devel-0:0.10-0.2.el4.ppc", "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4WS:seamonkey-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-0:1.0.3-0.el4.1.src", "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3802" }, { "category": "external", "summary": "RHBZ#1618162", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618162" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3802", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3802" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3802", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3802" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-08-02T18:39:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nMultilib systems may experience difficulty if trying to specify the package\nby name to the Update Agent via a command line argument. This can be\nsolved by executing the following commands:\n\nup2date seamonkey; up2date seamonkey-nss seamonkey-nspr", "product_ids": [ "4AS:devhelp-0:0.10-0.2.el4.i386", "4AS:devhelp-0:0.10-0.2.el4.ppc", "4AS:devhelp-0:0.10-0.2.el4.src", "4AS:devhelp-0:0.10-0.2.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.2.el4.i386", "4AS:devhelp-devel-0:0.10-0.2.el4.ppc", "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4AS:seamonkey-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-0:1.0.3-0.el4.1.src", "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4Desktop:devhelp-0:0.10-0.2.el4.i386", "4Desktop:devhelp-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-0:0.10-0.2.el4.src", "4Desktop:devhelp-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-0:1.0.3-0.el4.1.src", "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4ES:devhelp-0:0.10-0.2.el4.i386", "4ES:devhelp-0:0.10-0.2.el4.ppc", "4ES:devhelp-0:0.10-0.2.el4.src", "4ES:devhelp-0:0.10-0.2.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.2.el4.i386", "4ES:devhelp-devel-0:0.10-0.2.el4.ppc", "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64", "4ES:seamonkey-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-0:1.0.3-0.el4.1.src", "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4WS:devhelp-0:0.10-0.2.el4.i386", "4WS:devhelp-0:0.10-0.2.el4.ppc", "4WS:devhelp-0:0.10-0.2.el4.src", "4WS:devhelp-0:0.10-0.2.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.2.el4.i386", "4WS:devhelp-devel-0:0.10-0.2.el4.ppc", "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4WS:seamonkey-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-0:1.0.3-0.el4.1.src", "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0609" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2006-3803", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618163" } ], "notes": [ { "category": "description", "text": "Race condition in the JavaScript garbage collection in Mozilla Firefox 1.5 before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 might allow remote attackers to execute arbitrary code by causing the garbage collector to delete a temporary variable while it is still being used during the creation of a new Function object.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:devhelp-0:0.10-0.2.el4.i386", "4AS:devhelp-0:0.10-0.2.el4.ppc", "4AS:devhelp-0:0.10-0.2.el4.src", "4AS:devhelp-0:0.10-0.2.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.2.el4.i386", "4AS:devhelp-devel-0:0.10-0.2.el4.ppc", "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4AS:seamonkey-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-0:1.0.3-0.el4.1.src", "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4Desktop:devhelp-0:0.10-0.2.el4.i386", "4Desktop:devhelp-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-0:0.10-0.2.el4.src", "4Desktop:devhelp-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-0:1.0.3-0.el4.1.src", "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4ES:devhelp-0:0.10-0.2.el4.i386", "4ES:devhelp-0:0.10-0.2.el4.ppc", "4ES:devhelp-0:0.10-0.2.el4.src", "4ES:devhelp-0:0.10-0.2.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.2.el4.i386", "4ES:devhelp-devel-0:0.10-0.2.el4.ppc", "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64", "4ES:seamonkey-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-0:1.0.3-0.el4.1.src", "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4WS:devhelp-0:0.10-0.2.el4.i386", "4WS:devhelp-0:0.10-0.2.el4.ppc", "4WS:devhelp-0:0.10-0.2.el4.src", "4WS:devhelp-0:0.10-0.2.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.2.el4.i386", "4WS:devhelp-devel-0:0.10-0.2.el4.ppc", "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4WS:seamonkey-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-0:1.0.3-0.el4.1.src", "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3803" }, { "category": "external", "summary": "RHBZ#1618163", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618163" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3803", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3803" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3803", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3803" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-08-02T18:39:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nMultilib systems may experience difficulty if trying to specify the package\nby name to the Update Agent via a command line argument. This can be\nsolved by executing the following commands:\n\nup2date seamonkey; up2date seamonkey-nss seamonkey-nspr", "product_ids": [ "4AS:devhelp-0:0.10-0.2.el4.i386", "4AS:devhelp-0:0.10-0.2.el4.ppc", "4AS:devhelp-0:0.10-0.2.el4.src", "4AS:devhelp-0:0.10-0.2.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.2.el4.i386", "4AS:devhelp-devel-0:0.10-0.2.el4.ppc", "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4AS:seamonkey-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-0:1.0.3-0.el4.1.src", "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4Desktop:devhelp-0:0.10-0.2.el4.i386", "4Desktop:devhelp-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-0:0.10-0.2.el4.src", "4Desktop:devhelp-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-0:1.0.3-0.el4.1.src", "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4ES:devhelp-0:0.10-0.2.el4.i386", "4ES:devhelp-0:0.10-0.2.el4.ppc", "4ES:devhelp-0:0.10-0.2.el4.src", "4ES:devhelp-0:0.10-0.2.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.2.el4.i386", "4ES:devhelp-devel-0:0.10-0.2.el4.ppc", "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64", "4ES:seamonkey-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-0:1.0.3-0.el4.1.src", "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4WS:devhelp-0:0.10-0.2.el4.i386", "4WS:devhelp-0:0.10-0.2.el4.ppc", "4WS:devhelp-0:0.10-0.2.el4.src", "4WS:devhelp-0:0.10-0.2.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.2.el4.i386", "4WS:devhelp-devel-0:0.10-0.2.el4.ppc", "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4WS:seamonkey-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-0:1.0.3-0.el4.1.src", "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0609" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-3804", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618164" } ], "notes": [ { "category": "description", "text": "Heap-based buffer overflow in Mozilla Thunderbird before 1.5.0.5 and SeaMonkey before 1.0.3 allows remote attackers to cause a denial of service (crash) via a VCard attachment with a malformed base64 field, which copies more data than expected due to an integer underflow.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:devhelp-0:0.10-0.2.el4.i386", "4AS:devhelp-0:0.10-0.2.el4.ppc", "4AS:devhelp-0:0.10-0.2.el4.src", "4AS:devhelp-0:0.10-0.2.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.2.el4.i386", "4AS:devhelp-devel-0:0.10-0.2.el4.ppc", "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4AS:seamonkey-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-0:1.0.3-0.el4.1.src", "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4Desktop:devhelp-0:0.10-0.2.el4.i386", "4Desktop:devhelp-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-0:0.10-0.2.el4.src", "4Desktop:devhelp-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-0:1.0.3-0.el4.1.src", "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4ES:devhelp-0:0.10-0.2.el4.i386", "4ES:devhelp-0:0.10-0.2.el4.ppc", "4ES:devhelp-0:0.10-0.2.el4.src", "4ES:devhelp-0:0.10-0.2.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.2.el4.i386", "4ES:devhelp-devel-0:0.10-0.2.el4.ppc", "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64", "4ES:seamonkey-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-0:1.0.3-0.el4.1.src", "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4WS:devhelp-0:0.10-0.2.el4.i386", "4WS:devhelp-0:0.10-0.2.el4.ppc", "4WS:devhelp-0:0.10-0.2.el4.src", "4WS:devhelp-0:0.10-0.2.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.2.el4.i386", "4WS:devhelp-devel-0:0.10-0.2.el4.ppc", "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4WS:seamonkey-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-0:1.0.3-0.el4.1.src", "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3804" }, { "category": "external", "summary": "RHBZ#1618164", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618164" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3804", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3804" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3804", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3804" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-08-02T18:39:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nMultilib systems may experience difficulty if trying to specify the package\nby name to the Update Agent via a command line argument. This can be\nsolved by executing the following commands:\n\nup2date seamonkey; up2date seamonkey-nss seamonkey-nspr", "product_ids": [ "4AS:devhelp-0:0.10-0.2.el4.i386", "4AS:devhelp-0:0.10-0.2.el4.ppc", "4AS:devhelp-0:0.10-0.2.el4.src", "4AS:devhelp-0:0.10-0.2.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.2.el4.i386", "4AS:devhelp-devel-0:0.10-0.2.el4.ppc", "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4AS:seamonkey-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-0:1.0.3-0.el4.1.src", "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4Desktop:devhelp-0:0.10-0.2.el4.i386", "4Desktop:devhelp-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-0:0.10-0.2.el4.src", "4Desktop:devhelp-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-0:1.0.3-0.el4.1.src", "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4ES:devhelp-0:0.10-0.2.el4.i386", "4ES:devhelp-0:0.10-0.2.el4.ppc", "4ES:devhelp-0:0.10-0.2.el4.src", "4ES:devhelp-0:0.10-0.2.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.2.el4.i386", "4ES:devhelp-devel-0:0.10-0.2.el4.ppc", "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64", "4ES:seamonkey-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-0:1.0.3-0.el4.1.src", "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4WS:devhelp-0:0.10-0.2.el4.i386", "4WS:devhelp-0:0.10-0.2.el4.ppc", "4WS:devhelp-0:0.10-0.2.el4.src", "4WS:devhelp-0:0.10-0.2.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.2.el4.i386", "4WS:devhelp-devel-0:0.10-0.2.el4.ppc", "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4WS:seamonkey-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-0:1.0.3-0.el4.1.src", "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0609" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-3805", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618165" } ], "notes": [ { "category": "description", "text": "The Javascript engine in Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 might allow remote attackers to execute arbitrary code via vectors involving garbage collection that causes deletion of a temporary object that is still being used.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:devhelp-0:0.10-0.2.el4.i386", "4AS:devhelp-0:0.10-0.2.el4.ppc", "4AS:devhelp-0:0.10-0.2.el4.src", "4AS:devhelp-0:0.10-0.2.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.2.el4.i386", "4AS:devhelp-devel-0:0.10-0.2.el4.ppc", "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4AS:seamonkey-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-0:1.0.3-0.el4.1.src", "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4Desktop:devhelp-0:0.10-0.2.el4.i386", "4Desktop:devhelp-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-0:0.10-0.2.el4.src", "4Desktop:devhelp-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-0:1.0.3-0.el4.1.src", "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4ES:devhelp-0:0.10-0.2.el4.i386", "4ES:devhelp-0:0.10-0.2.el4.ppc", "4ES:devhelp-0:0.10-0.2.el4.src", "4ES:devhelp-0:0.10-0.2.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.2.el4.i386", "4ES:devhelp-devel-0:0.10-0.2.el4.ppc", "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64", "4ES:seamonkey-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-0:1.0.3-0.el4.1.src", "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4WS:devhelp-0:0.10-0.2.el4.i386", "4WS:devhelp-0:0.10-0.2.el4.ppc", "4WS:devhelp-0:0.10-0.2.el4.src", "4WS:devhelp-0:0.10-0.2.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.2.el4.i386", "4WS:devhelp-devel-0:0.10-0.2.el4.ppc", "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4WS:seamonkey-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-0:1.0.3-0.el4.1.src", "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3805" }, { "category": "external", "summary": "RHBZ#1618165", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618165" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3805", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3805" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3805", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3805" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-08-02T18:39:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nMultilib systems may experience difficulty if trying to specify the package\nby name to the Update Agent via a command line argument. This can be\nsolved by executing the following commands:\n\nup2date seamonkey; up2date seamonkey-nss seamonkey-nspr", "product_ids": [ "4AS:devhelp-0:0.10-0.2.el4.i386", "4AS:devhelp-0:0.10-0.2.el4.ppc", "4AS:devhelp-0:0.10-0.2.el4.src", "4AS:devhelp-0:0.10-0.2.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.2.el4.i386", "4AS:devhelp-devel-0:0.10-0.2.el4.ppc", "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4AS:seamonkey-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-0:1.0.3-0.el4.1.src", "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4Desktop:devhelp-0:0.10-0.2.el4.i386", "4Desktop:devhelp-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-0:0.10-0.2.el4.src", "4Desktop:devhelp-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-0:1.0.3-0.el4.1.src", "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4ES:devhelp-0:0.10-0.2.el4.i386", "4ES:devhelp-0:0.10-0.2.el4.ppc", "4ES:devhelp-0:0.10-0.2.el4.src", "4ES:devhelp-0:0.10-0.2.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.2.el4.i386", "4ES:devhelp-devel-0:0.10-0.2.el4.ppc", "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64", "4ES:seamonkey-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-0:1.0.3-0.el4.1.src", "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4WS:devhelp-0:0.10-0.2.el4.i386", "4WS:devhelp-0:0.10-0.2.el4.ppc", "4WS:devhelp-0:0.10-0.2.el4.src", "4WS:devhelp-0:0.10-0.2.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.2.el4.i386", "4WS:devhelp-devel-0:0.10-0.2.el4.ppc", "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4WS:seamonkey-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-0:1.0.3-0.el4.1.src", "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0609" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-3806", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618166" } ], "notes": [ { "category": "description", "text": "Multiple integer overflows in the Javascript engine in Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 might allow remote attackers to execute arbitrary code via vectors involving (1) long strings in the toSource method of the Object, Array, and String objects; and (2) unspecified \"string function arguments.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:devhelp-0:0.10-0.2.el4.i386", "4AS:devhelp-0:0.10-0.2.el4.ppc", "4AS:devhelp-0:0.10-0.2.el4.src", "4AS:devhelp-0:0.10-0.2.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.2.el4.i386", "4AS:devhelp-devel-0:0.10-0.2.el4.ppc", "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4AS:seamonkey-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-0:1.0.3-0.el4.1.src", "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4Desktop:devhelp-0:0.10-0.2.el4.i386", "4Desktop:devhelp-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-0:0.10-0.2.el4.src", "4Desktop:devhelp-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-0:1.0.3-0.el4.1.src", "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4ES:devhelp-0:0.10-0.2.el4.i386", "4ES:devhelp-0:0.10-0.2.el4.ppc", "4ES:devhelp-0:0.10-0.2.el4.src", "4ES:devhelp-0:0.10-0.2.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.2.el4.i386", "4ES:devhelp-devel-0:0.10-0.2.el4.ppc", "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64", "4ES:seamonkey-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-0:1.0.3-0.el4.1.src", "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4WS:devhelp-0:0.10-0.2.el4.i386", "4WS:devhelp-0:0.10-0.2.el4.ppc", "4WS:devhelp-0:0.10-0.2.el4.src", "4WS:devhelp-0:0.10-0.2.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.2.el4.i386", "4WS:devhelp-devel-0:0.10-0.2.el4.ppc", "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4WS:seamonkey-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-0:1.0.3-0.el4.1.src", "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3806" }, { "category": "external", "summary": "RHBZ#1618166", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618166" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3806", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3806" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3806", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3806" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-08-02T18:39:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nMultilib systems may experience difficulty if trying to specify the package\nby name to the Update Agent via a command line argument. This can be\nsolved by executing the following commands:\n\nup2date seamonkey; up2date seamonkey-nss seamonkey-nspr", "product_ids": [ "4AS:devhelp-0:0.10-0.2.el4.i386", "4AS:devhelp-0:0.10-0.2.el4.ppc", "4AS:devhelp-0:0.10-0.2.el4.src", "4AS:devhelp-0:0.10-0.2.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.2.el4.i386", "4AS:devhelp-devel-0:0.10-0.2.el4.ppc", "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4AS:seamonkey-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-0:1.0.3-0.el4.1.src", "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4Desktop:devhelp-0:0.10-0.2.el4.i386", "4Desktop:devhelp-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-0:0.10-0.2.el4.src", "4Desktop:devhelp-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-0:1.0.3-0.el4.1.src", "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4ES:devhelp-0:0.10-0.2.el4.i386", "4ES:devhelp-0:0.10-0.2.el4.ppc", "4ES:devhelp-0:0.10-0.2.el4.src", "4ES:devhelp-0:0.10-0.2.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.2.el4.i386", "4ES:devhelp-devel-0:0.10-0.2.el4.ppc", "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64", "4ES:seamonkey-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-0:1.0.3-0.el4.1.src", "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4WS:devhelp-0:0.10-0.2.el4.i386", "4WS:devhelp-0:0.10-0.2.el4.ppc", "4WS:devhelp-0:0.10-0.2.el4.src", "4WS:devhelp-0:0.10-0.2.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.2.el4.i386", "4WS:devhelp-devel-0:0.10-0.2.el4.ppc", "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4WS:seamonkey-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-0:1.0.3-0.el4.1.src", "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0609" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-3807", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618167" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to execute arbitrary code via script that changes the standard Object() constructor to return a reference to a privileged object and calling \"named JavaScript functions\" that use the constructor.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:devhelp-0:0.10-0.2.el4.i386", "4AS:devhelp-0:0.10-0.2.el4.ppc", "4AS:devhelp-0:0.10-0.2.el4.src", "4AS:devhelp-0:0.10-0.2.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.2.el4.i386", "4AS:devhelp-devel-0:0.10-0.2.el4.ppc", "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4AS:seamonkey-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-0:1.0.3-0.el4.1.src", "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4Desktop:devhelp-0:0.10-0.2.el4.i386", "4Desktop:devhelp-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-0:0.10-0.2.el4.src", "4Desktop:devhelp-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-0:1.0.3-0.el4.1.src", "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4ES:devhelp-0:0.10-0.2.el4.i386", "4ES:devhelp-0:0.10-0.2.el4.ppc", "4ES:devhelp-0:0.10-0.2.el4.src", "4ES:devhelp-0:0.10-0.2.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.2.el4.i386", "4ES:devhelp-devel-0:0.10-0.2.el4.ppc", "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64", "4ES:seamonkey-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-0:1.0.3-0.el4.1.src", "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4WS:devhelp-0:0.10-0.2.el4.i386", "4WS:devhelp-0:0.10-0.2.el4.ppc", "4WS:devhelp-0:0.10-0.2.el4.src", "4WS:devhelp-0:0.10-0.2.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.2.el4.i386", "4WS:devhelp-devel-0:0.10-0.2.el4.ppc", "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4WS:seamonkey-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-0:1.0.3-0.el4.1.src", "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3807" }, { "category": "external", "summary": "RHBZ#1618167", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618167" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3807", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3807" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3807", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3807" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-08-02T18:39:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nMultilib systems may experience difficulty if trying to specify the package\nby name to the Update Agent via a command line argument. This can be\nsolved by executing the following commands:\n\nup2date seamonkey; up2date seamonkey-nss seamonkey-nspr", "product_ids": [ "4AS:devhelp-0:0.10-0.2.el4.i386", "4AS:devhelp-0:0.10-0.2.el4.ppc", "4AS:devhelp-0:0.10-0.2.el4.src", "4AS:devhelp-0:0.10-0.2.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.2.el4.i386", "4AS:devhelp-devel-0:0.10-0.2.el4.ppc", "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4AS:seamonkey-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-0:1.0.3-0.el4.1.src", "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4Desktop:devhelp-0:0.10-0.2.el4.i386", "4Desktop:devhelp-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-0:0.10-0.2.el4.src", "4Desktop:devhelp-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-0:1.0.3-0.el4.1.src", "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4ES:devhelp-0:0.10-0.2.el4.i386", "4ES:devhelp-0:0.10-0.2.el4.ppc", "4ES:devhelp-0:0.10-0.2.el4.src", "4ES:devhelp-0:0.10-0.2.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.2.el4.i386", "4ES:devhelp-devel-0:0.10-0.2.el4.ppc", "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64", "4ES:seamonkey-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-0:1.0.3-0.el4.1.src", "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4WS:devhelp-0:0.10-0.2.el4.i386", "4WS:devhelp-0:0.10-0.2.el4.ppc", "4WS:devhelp-0:0.10-0.2.el4.src", "4WS:devhelp-0:0.10-0.2.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.2.el4.i386", "4WS:devhelp-devel-0:0.10-0.2.el4.ppc", "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4WS:seamonkey-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-0:1.0.3-0.el4.1.src", "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0609" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-3808", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618168" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox before 1.5.0.5 and SeaMonkey before 1.0.3 allows remote Proxy AutoConfig (PAC) servers to execute code with elevated privileges via a PAC script that sets the FindProxyForURL function to an eval method on a privileged object.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:devhelp-0:0.10-0.2.el4.i386", "4AS:devhelp-0:0.10-0.2.el4.ppc", "4AS:devhelp-0:0.10-0.2.el4.src", "4AS:devhelp-0:0.10-0.2.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.2.el4.i386", "4AS:devhelp-devel-0:0.10-0.2.el4.ppc", "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4AS:seamonkey-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-0:1.0.3-0.el4.1.src", "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4Desktop:devhelp-0:0.10-0.2.el4.i386", "4Desktop:devhelp-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-0:0.10-0.2.el4.src", "4Desktop:devhelp-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-0:1.0.3-0.el4.1.src", "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4ES:devhelp-0:0.10-0.2.el4.i386", "4ES:devhelp-0:0.10-0.2.el4.ppc", "4ES:devhelp-0:0.10-0.2.el4.src", "4ES:devhelp-0:0.10-0.2.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.2.el4.i386", "4ES:devhelp-devel-0:0.10-0.2.el4.ppc", "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64", "4ES:seamonkey-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-0:1.0.3-0.el4.1.src", "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4WS:devhelp-0:0.10-0.2.el4.i386", "4WS:devhelp-0:0.10-0.2.el4.ppc", "4WS:devhelp-0:0.10-0.2.el4.src", "4WS:devhelp-0:0.10-0.2.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.2.el4.i386", "4WS:devhelp-devel-0:0.10-0.2.el4.ppc", "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4WS:seamonkey-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-0:1.0.3-0.el4.1.src", "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3808" }, { "category": "external", "summary": "RHBZ#1618168", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618168" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3808", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3808" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3808", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3808" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-08-02T18:39:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nMultilib systems may experience difficulty if trying to specify the package\nby name to the Update Agent via a command line argument. This can be\nsolved by executing the following commands:\n\nup2date seamonkey; up2date seamonkey-nss seamonkey-nspr", "product_ids": [ "4AS:devhelp-0:0.10-0.2.el4.i386", "4AS:devhelp-0:0.10-0.2.el4.ppc", "4AS:devhelp-0:0.10-0.2.el4.src", "4AS:devhelp-0:0.10-0.2.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.2.el4.i386", "4AS:devhelp-devel-0:0.10-0.2.el4.ppc", "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4AS:seamonkey-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-0:1.0.3-0.el4.1.src", "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4Desktop:devhelp-0:0.10-0.2.el4.i386", "4Desktop:devhelp-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-0:0.10-0.2.el4.src", "4Desktop:devhelp-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-0:1.0.3-0.el4.1.src", "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4ES:devhelp-0:0.10-0.2.el4.i386", "4ES:devhelp-0:0.10-0.2.el4.ppc", "4ES:devhelp-0:0.10-0.2.el4.src", "4ES:devhelp-0:0.10-0.2.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.2.el4.i386", "4ES:devhelp-devel-0:0.10-0.2.el4.ppc", "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64", "4ES:seamonkey-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-0:1.0.3-0.el4.1.src", "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4WS:devhelp-0:0.10-0.2.el4.i386", "4WS:devhelp-0:0.10-0.2.el4.ppc", "4WS:devhelp-0:0.10-0.2.el4.src", "4WS:devhelp-0:0.10-0.2.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.2.el4.i386", "4WS:devhelp-devel-0:0.10-0.2.el4.ppc", "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4WS:seamonkey-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-0:1.0.3-0.el4.1.src", "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0609" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2006-3809", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618169" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows scripts with the UniversalBrowserRead privilege to gain UniversalXPConnect privileges and possibly execute code or obtain sensitive data by reading into a privileged context.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:devhelp-0:0.10-0.2.el4.i386", "4AS:devhelp-0:0.10-0.2.el4.ppc", "4AS:devhelp-0:0.10-0.2.el4.src", "4AS:devhelp-0:0.10-0.2.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.2.el4.i386", "4AS:devhelp-devel-0:0.10-0.2.el4.ppc", "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4AS:seamonkey-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-0:1.0.3-0.el4.1.src", "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4Desktop:devhelp-0:0.10-0.2.el4.i386", "4Desktop:devhelp-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-0:0.10-0.2.el4.src", "4Desktop:devhelp-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-0:1.0.3-0.el4.1.src", "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4ES:devhelp-0:0.10-0.2.el4.i386", "4ES:devhelp-0:0.10-0.2.el4.ppc", "4ES:devhelp-0:0.10-0.2.el4.src", "4ES:devhelp-0:0.10-0.2.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.2.el4.i386", "4ES:devhelp-devel-0:0.10-0.2.el4.ppc", "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64", "4ES:seamonkey-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-0:1.0.3-0.el4.1.src", "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4WS:devhelp-0:0.10-0.2.el4.i386", "4WS:devhelp-0:0.10-0.2.el4.ppc", "4WS:devhelp-0:0.10-0.2.el4.src", "4WS:devhelp-0:0.10-0.2.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.2.el4.i386", "4WS:devhelp-devel-0:0.10-0.2.el4.ppc", "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4WS:seamonkey-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-0:1.0.3-0.el4.1.src", "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3809" }, { "category": "external", "summary": "RHBZ#1618169", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618169" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3809", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3809" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3809", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3809" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-08-02T18:39:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nMultilib systems may experience difficulty if trying to specify the package\nby name to the Update Agent via a command line argument. This can be\nsolved by executing the following commands:\n\nup2date seamonkey; up2date seamonkey-nss seamonkey-nspr", "product_ids": [ "4AS:devhelp-0:0.10-0.2.el4.i386", "4AS:devhelp-0:0.10-0.2.el4.ppc", "4AS:devhelp-0:0.10-0.2.el4.src", "4AS:devhelp-0:0.10-0.2.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.2.el4.i386", "4AS:devhelp-devel-0:0.10-0.2.el4.ppc", "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4AS:seamonkey-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-0:1.0.3-0.el4.1.src", "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4Desktop:devhelp-0:0.10-0.2.el4.i386", "4Desktop:devhelp-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-0:0.10-0.2.el4.src", "4Desktop:devhelp-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-0:1.0.3-0.el4.1.src", "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4ES:devhelp-0:0.10-0.2.el4.i386", "4ES:devhelp-0:0.10-0.2.el4.ppc", "4ES:devhelp-0:0.10-0.2.el4.src", "4ES:devhelp-0:0.10-0.2.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.2.el4.i386", "4ES:devhelp-devel-0:0.10-0.2.el4.ppc", "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64", "4ES:seamonkey-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-0:1.0.3-0.el4.1.src", "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4WS:devhelp-0:0.10-0.2.el4.i386", "4WS:devhelp-0:0.10-0.2.el4.ppc", "4WS:devhelp-0:0.10-0.2.el4.src", "4WS:devhelp-0:0.10-0.2.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.2.el4.i386", "4WS:devhelp-devel-0:0.10-0.2.el4.ppc", "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4WS:seamonkey-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-0:1.0.3-0.el4.1.src", "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0609" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-3810", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618170" } ], "notes": [ { "category": "description", "text": "Cross-site scripting (XSS) vulnerability in Mozilla Firefox 1.5 before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to inject arbitrary web script or HTML via the XPCNativeWrapper(window).Function construct.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:devhelp-0:0.10-0.2.el4.i386", "4AS:devhelp-0:0.10-0.2.el4.ppc", "4AS:devhelp-0:0.10-0.2.el4.src", "4AS:devhelp-0:0.10-0.2.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.2.el4.i386", "4AS:devhelp-devel-0:0.10-0.2.el4.ppc", "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4AS:seamonkey-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-0:1.0.3-0.el4.1.src", "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4Desktop:devhelp-0:0.10-0.2.el4.i386", "4Desktop:devhelp-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-0:0.10-0.2.el4.src", "4Desktop:devhelp-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-0:1.0.3-0.el4.1.src", "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4ES:devhelp-0:0.10-0.2.el4.i386", "4ES:devhelp-0:0.10-0.2.el4.ppc", "4ES:devhelp-0:0.10-0.2.el4.src", "4ES:devhelp-0:0.10-0.2.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.2.el4.i386", "4ES:devhelp-devel-0:0.10-0.2.el4.ppc", "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64", "4ES:seamonkey-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-0:1.0.3-0.el4.1.src", "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4WS:devhelp-0:0.10-0.2.el4.i386", "4WS:devhelp-0:0.10-0.2.el4.ppc", "4WS:devhelp-0:0.10-0.2.el4.src", "4WS:devhelp-0:0.10-0.2.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.2.el4.i386", "4WS:devhelp-devel-0:0.10-0.2.el4.ppc", "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4WS:seamonkey-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-0:1.0.3-0.el4.1.src", "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3810" }, { "category": "external", "summary": "RHBZ#1618170", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618170" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3810", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3810" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3810", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3810" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-08-02T18:39:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nMultilib systems may experience difficulty if trying to specify the package\nby name to the Update Agent via a command line argument. This can be\nsolved by executing the following commands:\n\nup2date seamonkey; up2date seamonkey-nss seamonkey-nspr", "product_ids": [ "4AS:devhelp-0:0.10-0.2.el4.i386", "4AS:devhelp-0:0.10-0.2.el4.ppc", "4AS:devhelp-0:0.10-0.2.el4.src", "4AS:devhelp-0:0.10-0.2.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.2.el4.i386", "4AS:devhelp-devel-0:0.10-0.2.el4.ppc", "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4AS:seamonkey-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-0:1.0.3-0.el4.1.src", "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4Desktop:devhelp-0:0.10-0.2.el4.i386", "4Desktop:devhelp-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-0:0.10-0.2.el4.src", "4Desktop:devhelp-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-0:1.0.3-0.el4.1.src", "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4ES:devhelp-0:0.10-0.2.el4.i386", "4ES:devhelp-0:0.10-0.2.el4.ppc", "4ES:devhelp-0:0.10-0.2.el4.src", "4ES:devhelp-0:0.10-0.2.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.2.el4.i386", "4ES:devhelp-devel-0:0.10-0.2.el4.ppc", "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64", "4ES:seamonkey-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-0:1.0.3-0.el4.1.src", "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4WS:devhelp-0:0.10-0.2.el4.i386", "4WS:devhelp-0:0.10-0.2.el4.ppc", "4WS:devhelp-0:0.10-0.2.el4.src", "4WS:devhelp-0:0.10-0.2.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.2.el4.i386", "4WS:devhelp-devel-0:0.10-0.2.el4.ppc", "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4WS:seamonkey-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-0:1.0.3-0.el4.1.src", "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0609" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2006-3811", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618171" } ], "notes": [ { "category": "description", "text": "Multiple vulnerabilities in Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via Javascript that leads to memory corruption, including (1) nsListControlFrame::FireMenuItemActiveEvent, (2) buffer overflows in the string class in out-of-memory conditions, (3) table row and column groups, (4) \"anonymous box selectors outside of UA stylesheets,\" (5) stale references to \"removed nodes,\" and (6) running the crypto.generateCRMFRequest callback on deleted context.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:devhelp-0:0.10-0.2.el4.i386", "4AS:devhelp-0:0.10-0.2.el4.ppc", "4AS:devhelp-0:0.10-0.2.el4.src", "4AS:devhelp-0:0.10-0.2.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.2.el4.i386", "4AS:devhelp-devel-0:0.10-0.2.el4.ppc", "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4AS:seamonkey-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-0:1.0.3-0.el4.1.src", "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4Desktop:devhelp-0:0.10-0.2.el4.i386", "4Desktop:devhelp-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-0:0.10-0.2.el4.src", "4Desktop:devhelp-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-0:1.0.3-0.el4.1.src", "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4ES:devhelp-0:0.10-0.2.el4.i386", "4ES:devhelp-0:0.10-0.2.el4.ppc", "4ES:devhelp-0:0.10-0.2.el4.src", "4ES:devhelp-0:0.10-0.2.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.2.el4.i386", "4ES:devhelp-devel-0:0.10-0.2.el4.ppc", "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64", "4ES:seamonkey-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-0:1.0.3-0.el4.1.src", "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4WS:devhelp-0:0.10-0.2.el4.i386", "4WS:devhelp-0:0.10-0.2.el4.ppc", "4WS:devhelp-0:0.10-0.2.el4.src", "4WS:devhelp-0:0.10-0.2.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.2.el4.i386", "4WS:devhelp-devel-0:0.10-0.2.el4.ppc", "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4WS:seamonkey-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-0:1.0.3-0.el4.1.src", "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3811" }, { "category": "external", "summary": "RHBZ#1618171", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618171" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3811", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3811" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3811", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3811" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-08-02T18:39:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nMultilib systems may experience difficulty if trying to specify the package\nby name to the Update Agent via a command line argument. This can be\nsolved by executing the following commands:\n\nup2date seamonkey; up2date seamonkey-nss seamonkey-nspr", "product_ids": [ "4AS:devhelp-0:0.10-0.2.el4.i386", "4AS:devhelp-0:0.10-0.2.el4.ppc", "4AS:devhelp-0:0.10-0.2.el4.src", "4AS:devhelp-0:0.10-0.2.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.2.el4.i386", "4AS:devhelp-devel-0:0.10-0.2.el4.ppc", "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4AS:seamonkey-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-0:1.0.3-0.el4.1.src", "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4Desktop:devhelp-0:0.10-0.2.el4.i386", "4Desktop:devhelp-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-0:0.10-0.2.el4.src", "4Desktop:devhelp-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-0:1.0.3-0.el4.1.src", "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4ES:devhelp-0:0.10-0.2.el4.i386", "4ES:devhelp-0:0.10-0.2.el4.ppc", "4ES:devhelp-0:0.10-0.2.el4.src", "4ES:devhelp-0:0.10-0.2.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.2.el4.i386", "4ES:devhelp-devel-0:0.10-0.2.el4.ppc", "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64", "4ES:seamonkey-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-0:1.0.3-0.el4.1.src", "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4WS:devhelp-0:0.10-0.2.el4.i386", "4WS:devhelp-0:0.10-0.2.el4.ppc", "4WS:devhelp-0:0.10-0.2.el4.src", "4WS:devhelp-0:0.10-0.2.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.2.el4.i386", "4WS:devhelp-devel-0:0.10-0.2.el4.ppc", "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4WS:seamonkey-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-0:1.0.3-0.el4.1.src", "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0609" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-3812", "discovery_date": "2006-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "200455" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to reference remote files and possibly load chrome: URLs by tricking the user into copying or dragging links.", "title": "Vulnerability description" }, { "category": "summary", "text": "vulnerabilities: CVE-2006-{3113,3677,3801-3812}", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:devhelp-0:0.10-0.2.el4.i386", "4AS:devhelp-0:0.10-0.2.el4.ppc", "4AS:devhelp-0:0.10-0.2.el4.src", "4AS:devhelp-0:0.10-0.2.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.2.el4.i386", "4AS:devhelp-devel-0:0.10-0.2.el4.ppc", "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4AS:seamonkey-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-0:1.0.3-0.el4.1.src", "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4Desktop:devhelp-0:0.10-0.2.el4.i386", "4Desktop:devhelp-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-0:0.10-0.2.el4.src", "4Desktop:devhelp-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-0:1.0.3-0.el4.1.src", "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4ES:devhelp-0:0.10-0.2.el4.i386", "4ES:devhelp-0:0.10-0.2.el4.ppc", "4ES:devhelp-0:0.10-0.2.el4.src", "4ES:devhelp-0:0.10-0.2.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.2.el4.i386", "4ES:devhelp-devel-0:0.10-0.2.el4.ppc", "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64", "4ES:seamonkey-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-0:1.0.3-0.el4.1.src", "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4WS:devhelp-0:0.10-0.2.el4.i386", "4WS:devhelp-0:0.10-0.2.el4.ppc", "4WS:devhelp-0:0.10-0.2.el4.src", "4WS:devhelp-0:0.10-0.2.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.2.el4.i386", "4WS:devhelp-devel-0:0.10-0.2.el4.ppc", "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4WS:seamonkey-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-0:1.0.3-0.el4.1.src", "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3812" }, { "category": "external", "summary": "RHBZ#200455", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=200455" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3812", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3812" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3812", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3812" } ], "release_date": "2006-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-08-02T18:39:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nMultilib systems may experience difficulty if trying to specify the package\nby name to the Update Agent via a command line argument. This can be\nsolved by executing the following commands:\n\nup2date seamonkey; up2date seamonkey-nss seamonkey-nspr", "product_ids": [ "4AS:devhelp-0:0.10-0.2.el4.i386", "4AS:devhelp-0:0.10-0.2.el4.ppc", "4AS:devhelp-0:0.10-0.2.el4.src", "4AS:devhelp-0:0.10-0.2.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.2.el4.i386", "4AS:devhelp-devel-0:0.10-0.2.el4.ppc", "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4AS:seamonkey-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-0:1.0.3-0.el4.1.src", "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4Desktop:devhelp-0:0.10-0.2.el4.i386", "4Desktop:devhelp-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-0:0.10-0.2.el4.src", "4Desktop:devhelp-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-0:1.0.3-0.el4.1.src", "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4ES:devhelp-0:0.10-0.2.el4.i386", "4ES:devhelp-0:0.10-0.2.el4.ppc", "4ES:devhelp-0:0.10-0.2.el4.src", "4ES:devhelp-0:0.10-0.2.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.2.el4.i386", "4ES:devhelp-devel-0:0.10-0.2.el4.ppc", "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64", "4ES:seamonkey-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-0:1.0.3-0.el4.1.src", "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64", "4WS:devhelp-0:0.10-0.2.el4.i386", "4WS:devhelp-0:0.10-0.2.el4.ppc", "4WS:devhelp-0:0.10-0.2.el4.src", "4WS:devhelp-0:0.10-0.2.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.2.el4.i386", "4WS:devhelp-devel-0:0.10-0.2.el4.ppc", "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64", "4WS:seamonkey-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-0:1.0.3-0.el4.1.src", "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x", "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0609" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "vulnerabilities: CVE-2006-{3113,3677,3801-3812}" } ] }
ghsa-wj5j-gg8h-gp5m
Vulnerability from github
Mozilla Firefox 1.5 before 1.5.0.5 and SeaMonkey before 1.0.3 allows remote attackers to execute arbitrary code by changing certain properties of the window navigator object (window.navigator) that are accessed when Java starts up, which causes a crash that leads to code execution.
{ "affected": [], "aliases": [ "CVE-2006-3677" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2006-07-27T19:04:00Z", "severity": "HIGH" }, "details": "Mozilla Firefox 1.5 before 1.5.0.5 and SeaMonkey before 1.0.3 allows remote attackers to execute arbitrary code by changing certain properties of the window navigator object (window.navigator) that are accessed when Java starts up, which causes a crash that leads to code execution.", "id": "GHSA-wj5j-gg8h-gp5m", "modified": "2022-05-03T03:16:08Z", "published": "2022-05-03T03:16:08Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3677" }, { "type": "WEB", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27981" }, { "type": "WEB", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39998" }, { "type": "WEB", "url": "https://issues.rpath.com/browse/RPL-536" }, { "type": "WEB", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10745" }, { "type": "WEB", "url": "https://usn.ubuntu.com/327-1" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2006-0609.html" }, { "type": "WEB", "url": "http://secunia.com/advisories/19873" }, { "type": "WEB", "url": "http://secunia.com/advisories/21216" }, { "type": "WEB", "url": "http://secunia.com/advisories/21229" }, { "type": "WEB", "url": "http://secunia.com/advisories/21243" }, { "type": "WEB", "url": "http://secunia.com/advisories/21246" }, { "type": "WEB", "url": "http://secunia.com/advisories/21262" }, { "type": "WEB", "url": "http://secunia.com/advisories/21269" }, { "type": "WEB", "url": "http://secunia.com/advisories/21270" }, { "type": "WEB", "url": "http://secunia.com/advisories/21336" }, { "type": "WEB", "url": "http://secunia.com/advisories/21343" }, { "type": "WEB", "url": "http://secunia.com/advisories/21361" }, { "type": "WEB", "url": "http://secunia.com/advisories/21529" }, { "type": "WEB", "url": "http://secunia.com/advisories/21532" }, { "type": "WEB", "url": "http://secunia.com/advisories/21631" }, { "type": "WEB", "url": "http://secunia.com/advisories/22066" }, { "type": "WEB", "url": "http://secunia.com/advisories/22210" }, { "type": "WEB", "url": "http://security.gentoo.org/glsa/glsa-200608-02.xml" }, { "type": "WEB", "url": "http://securitytracker.com/id?1016586" }, { "type": "WEB", "url": "http://securitytracker.com/id?1016587" }, { "type": "WEB", "url": "http://www.gentoo.org/security/en/glsa/glsa-200608-03.xml" }, { "type": "WEB", "url": "http://www.kb.cert.org/vuls/id/670060" }, { "type": "WEB", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:143" }, { "type": "WEB", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:145" }, { "type": "WEB", "url": "http://www.mozilla.org/security/announce/2006/mfsa2006-45.html" }, { "type": "WEB", "url": "http://www.novell.com/linux/security/advisories/2006_48_seamonkey.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2006-0594.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2006-0608.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2006-0610.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2006-0611.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/archive/1/441332/100/0/threaded" }, { "type": "WEB", "url": "http://www.securityfocus.com/archive/1/441333/100/0/threaded" }, { "type": "WEB", "url": "http://www.securityfocus.com/archive/1/446658/100/200/threaded" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/19181" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/19192" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/usn-354-1" }, { "type": "WEB", "url": "http://www.us-cert.gov/cas/techalerts/TA06-208A.html" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2006/2998" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2006/3748" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2008/0083" }, { "type": "WEB", "url": "http://www.zerodayinitiative.com/advisories/ZDI-06-025.html" } ], "schema_version": "1.4.0", "severity": [] }
fkie_cve-2006-3677
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mozilla:firefox:1.5:*:*:*:*:*:*:*", "matchCriteriaId": "ABB88E86-6E83-4A59-9266-8B98AA91774D", "vulnerable": true }, { "criteria": "cpe:2.3:a:mozilla:firefox:1.5.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "7D6BF5B1-86D1-47FE-9D9C-735718F94874", "vulnerable": true }, { "criteria": "cpe:2.3:a:mozilla:firefox:1.5.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "84D15CE0-69DF-4EFD-801E-96A4D6AABEDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:mozilla:firefox:1.5.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "CEE203DE-6C0E-4FDE-9C3A-0E73430F17DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:mozilla:firefox:1.5.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "F2F38886-C25A-4C6B-93E7-36461405BA99", "vulnerable": true }, { "criteria": "cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "09E18FC0-0C8C-4FA1-85B9-B868D00F002F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mozilla:seamonkey:1.0:*:dev:*:*:*:*:*", "matchCriteriaId": "55344F76-1C42-4DD8-A28B-1C33626C6FD2", "vulnerable": true }, { "criteria": "cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "6521C877-63C9-4B6E-9FC9-1263FFBB7950", "vulnerable": true }, { "criteria": "cpe:2.3:a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "D949DF0A-CBC2-40E1-AE6C-60E6F58D2481", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Mozilla Firefox 1.5 before 1.5.0.5 and SeaMonkey before 1.0.3 allows remote attackers to execute arbitrary code by changing certain properties of the window navigator object (window.navigator) that are accessed when Java starts up, which causes a crash that leads to code execution." }, { "lang": "es", "value": "Mozilla Firefox 1.5 anterior a 1.5.0.5 y SeaMonkey anterior a 1.0.3 permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n cambiando ciertas propiedades del objeto de la ventana de navegaci\u00f3n (window.navigator) que es accedido cuando comienza Java, lo cual provoca un caida que desemboca en una ejecuci\u00f3n de c\u00f3digo." } ], "id": "CVE-2006-3677", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": true, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2006-07-27T19:04:00.000", "references": [ { "source": "cve@mitre.org", "url": "ftp://patches.sgi.com/support/free/security/advisories/20060703-01-U.asc" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2006-0609.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/19873" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/21216" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/21229" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/21243" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/21246" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/21262" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/21269" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/21270" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/21336" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/21343" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/21361" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/21529" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/21532" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/21631" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/22066" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/22210" }, { "source": "cve@mitre.org", "url": "http://security.gentoo.org/glsa/glsa-200608-02.xml" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1016586" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1016587" }, { "source": "cve@mitre.org", "url": "http://www.gentoo.org/security/en/glsa/glsa-200608-03.xml" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/670060" }, { "source": "cve@mitre.org", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:143" }, { "source": "cve@mitre.org", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:145" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.mozilla.org/security/announce/2006/mfsa2006-45.html" }, { "source": "cve@mitre.org", "url": "http://www.novell.com/linux/security/advisories/2006_48_seamonkey.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2006-0594.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2006-0608.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2006-0610.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2006-0611.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/441332/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/441333/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/446658/100/200/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/446658/100/200/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/19181" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/19192" }, { "source": "cve@mitre.org", "url": "http://www.ubuntu.com/usn/usn-354-1" }, { "source": "cve@mitre.org", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA06-208A.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2006/2998" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2006/3748" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2008/0083" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.zerodayinitiative.com/advisories/ZDI-06-025.html" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27981" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39998" }, { "source": "cve@mitre.org", "url": "https://issues.rpath.com/browse/RPL-536" }, { "source": "cve@mitre.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10745" }, { "source": "cve@mitre.org", "url": "https://usn.ubuntu.com/327-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "ftp://patches.sgi.com/support/free/security/advisories/20060703-01-U.asc" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2006-0609.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/19873" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/21216" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/21229" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/21243" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/21246" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/21262" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/21269" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/21270" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/21336" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/21343" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/21361" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/21529" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/21532" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/21631" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/22066" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/22210" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-200608-02.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1016586" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1016587" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.gentoo.org/security/en/glsa/glsa-200608-03.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/670060" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:143" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:145" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.mozilla.org/security/announce/2006/mfsa2006-45.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.novell.com/linux/security/advisories/2006_48_seamonkey.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2006-0594.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2006-0608.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2006-0610.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2006-0611.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/441332/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/441333/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/446658/100/200/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/446658/100/200/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/19181" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/19192" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/usn-354-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA06-208A.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2006/2998" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2006/3748" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2008/0083" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.zerodayinitiative.com/advisories/ZDI-06-025.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27981" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39998" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://issues.rpath.com/browse/RPL-536" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10745" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://usn.ubuntu.com/327-1/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-16" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
var-200607-0664
Vulnerability from variot
Mozilla Firefox 1.5 before 1.5.0.5 and SeaMonkey before 1.0.3 allows remote attackers to execute arbitrary code by changing certain properties of the window navigator object (window.navigator) that are accessed when Java starts up, which causes a crash that leads to code execution. Mozilla products fail to properly release memory. This vulnerability may allow a remote attacker to execute arbitrary code on a vulnerable system. User interaction is required to exploit this vulnerability in that the target must visit a malicious page.The flaw exists when assigning specific values to the window.navigator object. A lack of checking on assignment causes user supplied data to be later used in the creation of other objects leading to eventual code execution. The Mozilla Foundation has released thirteen security advisories specifying vulnerabilities in Mozilla Firefox, SeaMonkey, and Thunderbird. Other attacks may also be possible. The issues described here will be split into individual BIDs as more information becomes available. These issues are fixed in: - Mozilla Firefox 1.5.0.5 - Mozilla Thunderbird 1.5.0.5 - Mozilla SeaMonkey 1.0.3. Mozilla Firefox is prone to a remote code-execution vulnerability because the application fails to properly sanitize user-supplied input before using it to create new JavaScript objects. This issue was previously discussed in BID 19181 (Mozilla Multiple Products Remote Vulnerabilities). =========================================================== Ubuntu Security Notice USN-327-1 July 27, 2006 firefox vulnerabilities CVE-2006-3113, CVE-2006-3677, CVE-2006-3801, CVE-2006-3802, CVE-2006-3803, CVE-2006-3805, CVE-2006-3806, CVE-2006-3807, CVE-2006-3808, CVE-2006-3809, CVE-2006-3810, CVE-2006-3811, CVE-2006-3812 ===========================================================
A security issue affects the following Ubuntu releases:
Ubuntu 6.06 LTS
This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu.
The problem can be corrected by upgrading your system to the following package versions:
Ubuntu 6.06 LTS: firefox 1.5.dfsg+1.5.0.5-0ubuntu6.06
After a standard system upgrade you need to restart Firefox to effect the necessary changes.
Please note that Firefox 1.0.8 in Ubuntu 5.10 and Ubuntu 5.04 are also affected by these problems. Updates for these Ubuntu releases will be delayed due to upstream dropping support for this Firefox version. We strongly advise that you disable JavaScript to disable the attack vectors for most vulnerabilities if you use one of these Ubuntu versions. (CVE-2006-3113, CVE-2006-3677, CVE-2006-3801, CVE-2006-3803, CVE-2006-3805, CVE-2006-3806, CVE-2006-3807, CVE-2006-3809, CVE-2006-3811, CVE-2006-3812)
cross-site scripting vulnerabilities were found in the XPCNativeWrapper() function and native DOM method handlers. A malicious web site could exploit these to modify the contents or steal confidential data (such as passwords) from other opened web pages. (CVE-2006-3802, CVE-2006-3810)
A bug was found in the script handler for automatic proxy configuration. (CVE-2006-3808)
Please see
http://www.mozilla.org/projects/security/known-vulnerabilities.html#Firefox
for technical details of these vulnerabilities.
Updated packages for Ubuntu 6.06 LTS:
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.5-0ubuntu6.06.diff.gz
Size/MD5: 174602 7be6f5862219ac4cf44f05733f372f2b
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.5-0ubuntu6.06.dsc
Size/MD5: 1109 252d6acf45b009008a6bc88166e2632f
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.5.orig.tar.gz
Size/MD5: 44067762 749933c002e158576ec15782fc451e43
Architecture independent packages:
http://security.ubuntu.com/ubuntu/pool/universe/f/firefox/mozilla-firefox-dev_1.5.dfsg+1.5.0.5-0ubuntu6.06_all.deb
Size/MD5: 49190 850dd650e7f876dd539e605d9b3026c8
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/mozilla-firefox_1.5.dfsg+1.5.0.5-0ubuntu6.06_all.deb
Size/MD5: 50078 c1fa4a40187d9c5b58bd049edb00ce54
amd64 architecture (Athlon64, Opteron, EM64T Xeon)
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dbg_1.5.dfsg+1.5.0.5-0ubuntu6.06_amd64.deb
Size/MD5: 47269292 167aadc3f03b4e1b7cb9ed826e672983
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dev_1.5.dfsg+1.5.0.5-0ubuntu6.06_amd64.deb
Size/MD5: 2796768 b54592d0bd736f6ee12a90987771bc59
http://security.ubuntu.com/ubuntu/pool/universe/f/firefox/firefox-dom-inspector_1.5.dfsg+1.5.0.5-0ubuntu6.06_amd64.deb
Size/MD5: 216136 79fa6c69ffb0dd6037e56d1ba538ff64
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-gnome-support_1.5.dfsg+1.5.0.5-0ubuntu6.06_amd64.deb
Size/MD5: 82358 e2e026d582a7b5352cee4453cef0fe45
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.5-0ubuntu6.06_amd64.deb
Size/MD5: 9400544 a9d0b804a4374dc636bb79968a2bce5c
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnspr-dev_1.firefox1.5.dfsg+1.5.0.5-0ubuntu6.06_amd64.deb
Size/MD5: 218822 a09476caea7d8d73d6a2f534bd494493
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnspr4_1.firefox1.5.dfsg+1.5.0.5-0ubuntu6.06_amd64.deb
Size/MD5: 161876 0e0e65348dba8167b4891b173baa8f0d
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnss-dev_1.firefox1.5.dfsg+1.5.0.5-0ubuntu6.06_amd64.deb
Size/MD5: 235746 064fc1434a315f857ee92f60fd49d772
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnss3_1.firefox1.5.dfsg+1.5.0.5-0ubuntu6.06_amd64.deb
Size/MD5: 757458 bd6a5e28e05a04a5deca731ab29f70e4
i386 architecture (x86 compatible Intel/AMD)
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dbg_1.5.dfsg+1.5.0.5-0ubuntu6.06_i386.deb
Size/MD5: 43837610 a7e4a535262f8a5d5cb0ace7ed785237
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dev_1.5.dfsg+1.5.0.5-0ubuntu6.06_i386.deb
Size/MD5: 2796700 4509dbf62e3fd2cda7168c20aa65ba4f
http://security.ubuntu.com/ubuntu/pool/universe/f/firefox/firefox-dom-inspector_1.5.dfsg+1.5.0.5-0ubuntu6.06_i386.deb
Size/MD5: 209546 50e174c1c7290fca51f9e1ee71ebb56c
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-gnome-support_1.5.dfsg+1.5.0.5-0ubuntu6.06_i386.deb
Size/MD5: 74732 25ba86caeeb1a88da4493875178a3636
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.5-0ubuntu6.06_i386.deb
Size/MD5: 7916536 40ebfe4330af25c2359f8b25b039ed5e
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnspr-dev_1.firefox1.5.dfsg+1.5.0.5-0ubuntu6.06_i386.deb
Size/MD5: 218822 6066f59acbce1b4de2dc284b5801efc5
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnspr4_1.firefox1.5.dfsg+1.5.0.5-0ubuntu6.06_i386.deb
Size/MD5: 146570 c1a5c5cc4371b228093d03d9ed7ad607
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnss-dev_1.firefox1.5.dfsg+1.5.0.5-0ubuntu6.06_i386.deb
Size/MD5: 235754 0e9a1a89f63a9869b875ee6a50547c2b
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnss3_1.firefox1.5.dfsg+1.5.0.5-0ubuntu6.06_i386.deb
Size/MD5: 669556 d537a4771b80e5c06f18b2c5d7e5d384
powerpc architecture (Apple Macintosh G3/G4/G5)
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dbg_1.5.dfsg+1.5.0.5-0ubuntu6.06_powerpc.deb
Size/MD5: 48648192 479d29e08ff2b9cef89a6da3285c0aad
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dev_1.5.dfsg+1.5.0.5-0ubuntu6.06_powerpc.deb
Size/MD5: 2796790 60b97738bfc3b8b32914487bb4aba239
http://security.ubuntu.com/ubuntu/pool/universe/f/firefox/firefox-dom-inspector_1.5.dfsg+1.5.0.5-0ubuntu6.06_powerpc.deb
Size/MD5: 212982 a396e119a32303afc024d513b997c84e
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-gnome-support_1.5.dfsg+1.5.0.5-0ubuntu6.06_powerpc.deb
Size/MD5: 77894 ef7841bb2ab8de0e0c44e59c893b1622
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.5-0ubuntu6.06_powerpc.deb
Size/MD5: 9019132 ed3927484eea5fccf84a2840640febf3
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnspr-dev_1.firefox1.5.dfsg+1.5.0.5-0ubuntu6.06_powerpc.deb
Size/MD5: 218826 a2338c3c8064a304deb752bf32a291f8
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnspr4_1.firefox1.5.dfsg+1.5.0.5-0ubuntu6.06_powerpc.deb
Size/MD5: 159112 7d5d6100727ceb894695b219cec11e43
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnss-dev_1.firefox1.5.dfsg+1.5.0.5-0ubuntu6.06_powerpc.deb
Size/MD5: 235754 69085beb145222fea07d2d6c19158a2d
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnss3_1.firefox1.5.dfsg+1.5.0.5-0ubuntu6.06_powerpc.deb
Size/MD5: 768332 8dc6cc8c54185d57af14bab3bee39f9d
sparc architecture (Sun SPARC/UltraSPARC)
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dbg_1.5.dfsg+1.5.0.5-0ubuntu6.06_sparc.deb
Size/MD5: 45235424 f5a07188af5802fffbd3cfdd64b109cf
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dev_1.5.dfsg+1.5.0.5-0ubuntu6.06_sparc.deb
Size/MD5: 2796756 cb13c7ea0e3b7af2f1e12db1f8dc38a2
http://security.ubuntu.com/ubuntu/pool/universe/f/firefox/firefox-dom-inspector_1.5.dfsg+1.5.0.5-0ubuntu6.06_sparc.deb
Size/MD5: 210488 17f7723b697110c8f132422bc059d447
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-gnome-support_1.5.dfsg+1.5.0.5-0ubuntu6.06_sparc.deb
Size/MD5: 76340 c38ccb8b71b9c3783a1c9816ecd9cf5d
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.5-0ubuntu6.06_sparc.deb
Size/MD5: 8411310 4b3865b2df3924d094e0b18f207bf33d
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnspr-dev_1.firefox1.5.dfsg+1.5.0.5-0ubuntu6.06_sparc.deb
Size/MD5: 218814 a0e67d0d425cea2cd5835e2c2faa930f
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnspr4_1.firefox1.5.dfsg+1.5.0.5-0ubuntu6.06_sparc.deb
Size/MD5: 149018 73108368f0ef745188ebd1c48ea10c88
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnss-dev_1.firefox1.5.dfsg+1.5.0.5-0ubuntu6.06_sparc.deb
Size/MD5: 235746 695a6122710fb30201daaa239ba6d48d
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnss3_1.firefox1.5.dfsg+1.5.0.5-0ubuntu6.06_sparc.deb
Size/MD5: 681612 896721beb3cdcea12bab98223c0796c2
.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
National Cyber Alert System
Technical Cyber Security Alert TA06-208A
Mozilla Products Contain Multiple Vulnerabilities
Original release date: July 27, 2006 Last revised: -- Source: US-CERT
Systems Affected
* Mozilla SeaMonkey
* Mozilla Firefox
* Mozilla Thunderbird
Any products based on Mozilla components, specifically Gecko, may also be affected.
I. (CVE-2006-3805)
VU#655892 - Mozilla JavaScript engine contains multiple integer overflows
The Mozilla JavaScript engine contains multiple integer overflows. (CVE-2006-3811)
II.
III.
Disable JavaScript and Java
These vulnerabilities can be mitigated by disabling JavaScript and Java in all affected products. Instructions for disabling Java in Firefox can be found in the "Securing Your Web Browser" document.
Appendix A. Please send email to cert@cert.org with "TA06-208A Feedback VU#239124" in the subject.
For instructions on subscribing to or unsubscribing from this mailing list, visit http://www.us-cert.gov/cas/signup.html.
Produced 2006 by US-CERT, a government organization.
Terms of use:
<http://www.us-cert.gov/legal.html>
Revision History
Jul 27, 2006: Initial release
-----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (GNU/Linux)
iQEVAwUBRMkgNexOF3G+ig+rAQIFsAgAoWoMkxxhkzb+xgLVCJF7h4k4EBCgJGWa BSOiFfL4Gs4vv4lNooDRCIOdxiBfXYL71XsIOT4aWry5852/6kyYnyAiXXYj1Uv0 SbPY2sQSZ5EaG+G9i8HDIy3fpJN4XgH3ng1uzUnJihY19IfndbXicpZE+debIUri qt9NRD2f5FW5feKo1cBpYxtmxQAEePOa2dJHh7I7cnFGtG3MixHx4kVEyuYUutCX 5tHDsfTIdySNkIdCQ4vhk846bErB/kaHiKMQDfMglllb3GOSc07OQ0CDo2eTPVsA 9DtKkiDP1C4dh1mxco8CWlS6327+EB0KXGGoqDF2+j/rrpsW0oc8nA== =HwuK -----END PGP SIGNATURE----- .
Background
The Mozilla SeaMonkey project is a community effort to deliver production-quality releases of code derived from the application formerly known as "Mozilla Application Suite". The goal is to produce a cross-platform stand-alone browser application.
Affected packages
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 www-client/mozilla-firefox < 1.5.0.5 >= 1.5.0.5 2 www-client/mozilla-firefox-bin < 1.5.0.5 >= 1.5.0.5 ------------------------------------------------------------------- 2 affected packages on all of their supported architectures.
-
Developers in the Mozilla community looked for and fixed several crash bugs to improve the stability of Mozilla clients.
-
"shutdown" reports that cross-site scripting (XSS) attacks could be performed using the construct XPCNativeWrapper(window).Function(...), which created a function that appeared to belong to the window in question even after it had been navigated to the target site.
-
"shutdown" reports that scripts granting the UniversalBrowserRead privilege can leverage that into the equivalent of the far more powerful UniversalXPConnect since they are allowed to "read" into a privileged context.
-
"moz_bug_r_a4" reports that A malicious Proxy AutoConfig (PAC) server could serve a PAC script that can execute code with elevated privileges by setting the required FindProxyForURL function to the eval method on a privileged object that leaked into the PAC sandbox.
-
"moz_bug_r_a4" discovered that Named JavaScript functions have a parent object created using the standard Object() constructor (ECMA-specified behavior) and that this constructor can be redefined by script (also ECMA-specified behavior).
-
Igor Bukanov and shutdown found additional places where an untimely garbage collection could delete a temporary object that was in active use.
-
Georgi Guninski found potential integer overflow issues with long strings in the toSource() methods of the Object, Array and String objects as well as string function arguments.
-
H. D. Moore reported a testcase that was able to trigger a race condition where JavaScript garbage collection deleted a temporary variable still being used in the creation of a new Function object.
-
A malicious page can hijack native DOM methods on a document object in another domain, which will run the attacker's script when called by the victim page. This leads to use of a deleted timer object.
-
An anonymous researcher for TippingPoint and the Zero Day Initiative showed that when used in a web page Java would reference properties of the window.navigator object as it started up.
-
Thilo Girmann discovered that in certain circumstances a JavaScript reference to a frame or window was not properly cleared when the referenced content went away.
Impact
A user can be enticed to open specially crafted URLs, visit webpages containing malicious JavaScript or execute a specially crafted script.
Workaround
There is no known workaround at this time.
Resolution
All Mozilla Firefox users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose
">=www-client/mozilla-firefox-1.5.0.5"
Users of the binary package should upgrade as well:
# emerge --sync
# emerge --ask --oneshot --verbose
">=www-client/mozilla-firefox-bin-1.5.0.5"
References
[ 1 ] CVE-2006-3113 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3113 [ 2 ] CVE-2006-3677 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3677 [ 3 ] CVE-2006-3801 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3801 [ 4 ] CVE-2006-3802 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3802 [ 5 ] CVE-2006-3803 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3803 [ 6 ] CVE-2006-3805 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3805 [ 7 ] CVE-2006-3806 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3806 [ 8 ] CVE-2006-3807 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3807 [ 9 ] CVE-2006-3808 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3808 [ 10 ] CVE-2006-3809 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3809 [ 11 ] CVE-2006-3810 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3810 [ 12 ] CVE-2006-3811 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3811 [ 13 ] CVE-2006-3812 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3812
Availability
This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
http://security.gentoo.org/glsa/glsa-200608-03.xml
Concerns?
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at http://bugs.gentoo.org.
License
Copyright 2006 Gentoo Foundation, Inc; referenced text belongs to its owner(s).
The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
.
Hardcore Disassembler / Reverse Engineer Wanted!
Want to work with IDA and BinDiff? Want to write PoC's and Exploits?
Your nationality is not important. We will get you a work permit, find an apartment, and offer a relocation compensation package.
For more information, see vulnerabilities #1, #3, #4, #5, #6, #7, #9,
10, and #11:
SA19783
Successful exploitation of these vulnerabilities requires that JavaScript is enabled in mails (not default setting).
A boundary error has also been reported in the handling of VCard attachments. This can be exploited to cause a heap-based buffer overflow via a malicious VCard with a specially crafted base64 field that causes a crash and may allow execution of arbitrary code.
SOLUTION: Update to version 1.5.0.5.
PROVIDED AND/OR DISCOVERED BY: Daniel Veditz, Mozilla.
ORIGINAL ADVISORY: http://www.mozilla.org/security/announce/2006/mfsa2006-49.html
OTHER REFERENCES: SA19783: http://secunia.com/advisories/19873/
About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
.
Previous updates to Firefox were patch fixes to Firefox 1.0.6 that brought it in sync with 1.0.8 in terms of security fixes. In this update, Mozilla Firefox 1.5.0.6 is being provided which corrects a number of vulnerabilities that were previously unpatched, as well as providing new and enhanced features.
The following CVE names have been corrected with this update: CVE-2006-2613, CVE-2006-2894, CVE-2006-2775, CVE-2006-2776, CVE-2006-2777, CVE-2006-2778, CVE-2006-2779, CVE-2006-2780, CVE-2006-2782, CVE-2006-2783, CVE-2006-2784, CVE-2006-2785, CVE-2006-2786, CVE-2006-2787, CVE-2006-2788, CVE-2006-3677, CVE-2006-3803, CVE-2006-3804, CVE-2006-3806, CVE-2006-3807, CVE-2006-3113, CVE-2006-3801, CVE-2006-3802, CVE-2006-3805, CVE-2006-3808, CVE-2006-3809, CVE-2006-3810, CVE-2006-3811, CVE-2006-3812.
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2613 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2894 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2775 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2776 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2777 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2778 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2779 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2780 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2782 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2783 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2784 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2785 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2786 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2787 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2788 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3677 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3803 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3804 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3806 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3807 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3113 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3801 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3802 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3805 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3808 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3809 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3810 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3811 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3812 http://www.mozilla.org/security/announce/2006/mfsa2006-31.html http://www.mozilla.org/security/announce/2006/mfsa2006-32.html http://www.mozilla.org/security/announce/2006/mfsa2006-33.html http://www.mozilla.org/security/announce/2006/mfsa2006-34.html http://www.mozilla.org/security/announce/2006/mfsa2006-35.html http://www.mozilla.org/security/announce/2006/mfsa2006-36.html http://www.mozilla.org/security/announce/2006/mfsa2006-37.html http://www.mozilla.org/security/announce/2006/mfsa2006-38.html http://www.mozilla.org/security/announce/2006/mfsa2006-39.html http://www.mozilla.org/security/announce/2006/mfsa2006-41.html http://www.mozilla.org/security/announce/2006/mfsa2006-42.html http://www.mozilla.org/security/announce/2006/mfsa2006-43.html http://www.mozilla.org/security/announce/2006/mfsa2006-44.html http://www.mozilla.org/security/announce/2006/mfsa2006-45.html http://www.mozilla.org/security/announce/2006/mfsa2006-46.html http://www.mozilla.org/security/announce/2006/mfsa2006-47.html http://www.mozilla.org/security/announce/2006/mfsa2006-48.html http://www.mozilla.org/security/announce/2006/mfsa2006-50.html http://www.mozilla.org/security/announce/2006/mfsa2006-51.html http://www.mozilla.org/security/announce/2006/mfsa2006-52.html http://www.mozilla.org/security/announce/2006/mfsa2006-53.html http://www.mozilla.org/security/announce/2006/mfsa2006-54.html http://www.mozilla.org/security/announce/2006/mfsa2006-55.html http://www.mozilla.org/security/announce/2006/mfsa2006-56.html
Updated Packages:
Mandriva Linux 2006.0: 76ef1a2e7338c08e485ab2c19a1ce691 2006.0/RPMS/devhelp-0.10-7.1.20060mdk.i586.rpm d44f02b82df9f404f899ad8bc4bdd6a2 2006.0/RPMS/epiphany-1.8.5-4.1.20060mdk.i586.rpm 29efc065aeb4a53a105b2c27be816758 2006.0/RPMS/epiphany-devel-1.8.5-4.1.20060mdk.i586.rpm caad34c0d4c16a50ec4b05820e6d01db 2006.0/RPMS/galeon-2.0.1-1.1.20060mdk.i586.rpm d0e75938f4e129936351f015bd90a37a 2006.0/RPMS/gnome-doc-utils-0.4.4-2.1.20060mdk.noarch.rpm 652044ff7d9c3170df845011ec696393 2006.0/RPMS/libdevhelp-1_0-0.10-7.1.20060mdk.i586.rpm bf6dcf87f409d06b42234dbca387b922 2006.0/RPMS/libdevhelp-1_0-devel-0.10-7.1.20060mdk.i586.rpm e9aaff3090a4459b57367f4903b0458a 2006.0/RPMS/libnspr4-1.5.0.6-1.4.20060mdk.i586.rpm fa99cbc159722cc0ff9e5710f24ca599 2006.0/RPMS/libnspr4-devel-1.5.0.6-1.4.20060mdk.i586.rpm d4d45b797ca2f2347c0409d9f956ff25 2006.0/RPMS/libnspr4-static-devel-1.5.0.6-1.4.20060mdk.i586.rpm 8d33e72703090a911f7fd171ad9dd719 2006.0/RPMS/libnss3-1.5.0.6-1.4.20060mdk.i586.rpm 23afd287c042c5492c210255554a6893 2006.0/RPMS/libnss3-devel-1.5.0.6-1.4.20060mdk.i586.rpm 4a188f54230b943ea9c8930eb2e0cfe1 2006.0/RPMS/mozilla-firefox-1.5.0.6-1.4.20060mdk.i586.rpm 5bec4690547fd733ca97cb2933ebe427 2006.0/RPMS/mozilla-firefox-br-1.5.0.6-0.1.20060mdk.i586.rpm 55836595e5cba3828a9a5a27e5aa1825 2006.0/RPMS/mozilla-firefox-ca-1.5.0.6-0.1.20060mdk.i586.rpm 0faf5ee7022ee0b70915d2c845865cae 2006.0/RPMS/mozilla-firefox-cs-1.5.0.6-0.1.20060mdk.i586.rpm 312a89317692b3bd86060a1995365d86 2006.0/RPMS/mozilla-firefox-da-1.5.0.6-0.1.20060mdk.i586.rpm 38215dccbee8a169bcbac2af2897c2f7 2006.0/RPMS/mozilla-firefox-de-1.5.0.6-0.1.20060mdk.i586.rpm aaba2fa72f8de960a3a757b3010027d3 2006.0/RPMS/mozilla-firefox-devel-1.5.0.6-1.4.20060mdk.i586.rpm d8d59a55974f6fa20d99fb30f126638f 2006.0/RPMS/mozilla-firefox-el-1.5.0.6-0.1.20060mdk.i586.rpm 946e6a76c71dbbee3340f1a96ae25a1d 2006.0/RPMS/mozilla-firefox-es-1.5.0.6-0.1.20060mdk.i586.rpm 9a14c31a41c2bac3942caa3d1fb5daee 2006.0/RPMS/mozilla-firefox-fi-1.5.0.6-0.1.20060mdk.i586.rpm b5074c27d1cb719bf9f8fabe8aebf628 2006.0/RPMS/mozilla-firefox-fr-1.5.0.6-0.1.20060mdk.i586.rpm 7a225cdfdf0c17c0f4a72ad27907fc07 2006.0/RPMS/mozilla-firefox-ga-1.5.0.6-0.1.20060mdk.i586.rpm 06526a054d108d3c9b5f66313151ecc2 2006.0/RPMS/mozilla-firefox-he-1.5.0.6-0.1.20060mdk.i586.rpm 8f721bd3914c31e04359def6272db929 2006.0/RPMS/mozilla-firefox-hu-1.5.0.6-0.1.20060mdk.i586.rpm a704ed726e6db4ba59592563cd2c48b0 2006.0/RPMS/mozilla-firefox-it-1.5.0.6-0.1.20060mdk.i586.rpm 0ef6729b05e013a364e847e4a1b7b3e3 2006.0/RPMS/mozilla-firefox-ja-1.5.0.6-0.1.20060mdk.i586.rpm 570b19872de676414b399ff970024b78 2006.0/RPMS/mozilla-firefox-ko-1.5.0.6-0.1.20060mdk.i586.rpm dee38f0bbe3870d3bd8ad02ea968c57a 2006.0/RPMS/mozilla-firefox-nb-1.5.0.6-0.1.20060mdk.i586.rpm 92916e155ec38b5078234728593d72a2 2006.0/RPMS/mozilla-firefox-nl-1.5.0.6-0.1.20060mdk.i586.rpm c808f2f32fc9e514ffb097eeeb226a96 2006.0/RPMS/mozilla-firefox-pl-1.5.0.6-0.1.20060mdk.i586.rpm 6dda5771d062eae75f8f04b7dab8d6cc 2006.0/RPMS/mozilla-firefox-pt_BR-1.5.0.6-0.1.20060mdk.i586.rpm c4ac8441170504cc5ec05cf5c8e6e9f9 2006.0/RPMS/mozilla-firefox-ro-1.5.0.6-0.1.20060mdk.i586.rpm 2765008afd4c0ba1d702eda9627a7690 2006.0/RPMS/mozilla-firefox-ru-1.5.0.6-0.1.20060mdk.i586.rpm 15b600977b07651f1c3568f4d7f1f9ac 2006.0/RPMS/mozilla-firefox-sk-1.5.0.6-0.1.20060mdk.i586.rpm 6f1fae6befe608fc841fcc71e15852c0 2006.0/RPMS/mozilla-firefox-sl-1.5.0.6-0.1.20060mdk.i586.rpm 81f412da40ea14bcc23d420d7a5724f9 2006.0/RPMS/mozilla-firefox-sv-1.5.0.6-0.1.20060mdk.i586.rpm 76e0ece3c0b6f507340871a168a57e36 2006.0/RPMS/mozilla-firefox-tr-1.5.0.6-0.1.20060mdk.i586.rpm 6ded58e85ed113718cfb3484ae420bb9 2006.0/RPMS/mozilla-firefox-zh_CN-1.5.0.6-0.1.20060mdk.i586.rpm c76f6648e88de4a63991eac66c3fba04 2006.0/RPMS/mozilla-firefox-zh_TW-1.5.0.6-0.1.20060mdk.i586.rpm 1c7ab93275bcdcf30ed9ec2ddb4893df 2006.0/RPMS/yelp-2.10.0-6.1.20060mdk.i586.rpm 60279919aa5f17c2ecd9f64db87cb952 2006.0/SRPMS/devhelp-0.10-7.1.20060mdk.src.rpm c446c046409b6697a863868fe5c64222 2006.0/SRPMS/epiphany-1.8.5-4.1.20060mdk.src.rpm e726300336f737c8952f664bf1866d6f 2006.0/SRPMS/galeon-2.0.1-1.1.20060mdk.src.rpm e9e30596eceb0bc9a03f7880cd7d14ea 2006.0/SRPMS/gnome-doc-utils-0.4.4-2.1.20060mdk.src.rpm 4168c73cba97276fa4868b4ac2c7eb19 2006.0/SRPMS/mozilla-firefox-1.5.0.6-1.4.20060mdk.src.rpm 6a7df29f5af703d10d7ea1fee160ac00 2006.0/SRPMS/mozilla-firefox-br-1.5.0.6-0.1.20060mdk.src.rpm e56e14c28051ec4332cbde8dbee7bb6a 2006.0/SRPMS/mozilla-firefox-ca-1.5.0.6-0.1.20060mdk.src.rpm 1a144c86fd8db39e2801117296e15d2b 2006.0/SRPMS/mozilla-firefox-cs-1.5.0.6-0.1.20060mdk.src.rpm f4889d2ee6e07c0141b57ab9aaccae64 2006.0/SRPMS/mozilla-firefox-da-1.5.0.6-0.1.20060mdk.src.rpm dee0f7bc91c797e880fff19e1cb05a63 2006.0/SRPMS/mozilla-firefox-de-1.5.0.6-0.1.20060mdk.src.rpm 45724f6ceed66701392bd131feaf1f6d 2006.0/SRPMS/mozilla-firefox-el-1.5.0.6-0.1.20060mdk.src.rpm cc680cac7fea3f7f8a48a5daf86db088 2006.0/SRPMS/mozilla-firefox-es-1.5.0.6-0.1.20060mdk.src.rpm 69b04335c21313262af4253863109cc8 2006.0/SRPMS/mozilla-firefox-fi-1.5.0.6-0.1.20060mdk.src.rpm 2aab89244a535afcbc25271df5d6b33f 2006.0/SRPMS/mozilla-firefox-fr-1.5.0.6-0.1.20060mdk.src.rpm f1c7f71d5484c5047b1b38fc16888ae3 2006.0/SRPMS/mozilla-firefox-ga-1.5.0.6-0.1.20060mdk.src.rpm 3963e3c3a2c38c41d9d3bc5250b124a6 2006.0/SRPMS/mozilla-firefox-he-1.5.0.6-0.1.20060mdk.src.rpm bb54aed17a126a9e8568d49866db99ea 2006.0/SRPMS/mozilla-firefox-hu-1.5.0.6-0.1.20060mdk.src.rpm 2a1b11f2c8944bc1fc0d313d54a903cf 2006.0/SRPMS/mozilla-firefox-it-1.5.0.6-0.1.20060mdk.src.rpm 783c5b3c0fb9916e07f220110155476d 2006.0/SRPMS/mozilla-firefox-ja-1.5.0.6-0.1.20060mdk.src.rpm 895e315731fa0b453045cc39da4f5358 2006.0/SRPMS/mozilla-firefox-ko-1.5.0.6-0.1.20060mdk.src.rpm daa0a127d2a1a3641d4e97bfb95f1647 2006.0/SRPMS/mozilla-firefox-nb-1.5.0.6-0.1.20060mdk.src.rpm 0c778b0738b11dfd5d68be48fa6316ed 2006.0/SRPMS/mozilla-firefox-nl-1.5.0.6-0.1.20060mdk.src.rpm 7025d0118cf29e39117bd87c586e84a3 2006.0/SRPMS/mozilla-firefox-pl-1.5.0.6-0.1.20060mdk.src.rpm 5d8b8e869f588c0f5751e9ce7addba45 2006.0/SRPMS/mozilla-firefox-pt_BR-1.5.0.6-0.1.20060mdk.src.rpm c5148674a8c7dd1f88c5729293f899ba 2006.0/SRPMS/mozilla-firefox-ro-1.5.0.6-0.1.20060mdk.src.rpm 91d490c075473e2443e383201b961cb8 2006.0/SRPMS/mozilla-firefox-ru-1.5.0.6-0.1.20060mdk.src.rpm 622ae4619d151bb1634113e50b30fbac 2006.0/SRPMS/mozilla-firefox-sk-1.5.0.6-0.1.20060mdk.src.rpm e6d64c14929d299e2fb52e334ae6641a 2006.0/SRPMS/mozilla-firefox-sl-1.5.0.6-0.1.20060mdk.src.rpm 20f64c6dfd6aa1450cba5002d42f53d8 2006.0/SRPMS/mozilla-firefox-sv-1.5.0.6-0.1.20060mdk.src.rpm b93a6b548bb1cf0f8cc46dec133e81a3 2006.0/SRPMS/mozilla-firefox-tr-1.5.0.6-0.1.20060mdk.src.rpm f5603b65b3d10fa5083934e08d2d4560 2006.0/SRPMS/mozilla-firefox-zh_CN-1.5.0.6-0.1.20060mdk.src.rpm c0e978ea92b4a8f3aa75dad5ab7588b9 2006.0/SRPMS/mozilla-firefox-zh_TW-1.5.0.6-0.1.20060mdk.src.rpm 93cb0acaeddb095d13b37aeb0ab4dd49 2006.0/SRPMS/yelp-2.10.0-6.1.20060mdk.src.rpm
Mandriva Linux 2006.0/X86_64: d52f4955f15f99137dd9a0b2f360c8b2 x86_64/2006.0/RPMS/devhelp-0.10-7.1.20060mdk.x86_64.rpm 369457b4a09c07ba18ee5bb18fb2ffa1 x86_64/2006.0/RPMS/epiphany-1.8.5-4.1.20060mdk.x86_64.rpm 76735684f3ff493770e374a90fd359c7 x86_64/2006.0/RPMS/epiphany-devel-1.8.5-4.1.20060mdk.x86_64.rpm 5da75ab6624f8c8f0c212ce2299d645f x86_64/2006.0/RPMS/galeon-2.0.1-1.1.20060mdk.x86_64.rpm 945059b9456c9ff2ccd40ff4a6d8ae70 x86_64/2006.0/RPMS/gnome-doc-utils-0.4.4-2.1.20060mdk.noarch.rpm 193f97760bb46e16051ba7b6b968f340 x86_64/2006.0/RPMS/lib64devhelp-1_0-0.10-7.1.20060mdk.x86_64.rpm 1b67733b0450cd6572c9879c0eb38640 x86_64/2006.0/RPMS/lib64devhelp-1_0-devel-0.10-7.1.20060mdk.x86_64.rpm 115fcbc6c99bf063cd1768d2b08e9d89 x86_64/2006.0/RPMS/lib64nspr4-1.5.0.6-1.4.20060mdk.x86_64.rpm 686404fa32e2625f23b19e11c548bbe5 x86_64/2006.0/RPMS/lib64nspr4-devel-1.5.0.6-1.4.20060mdk.x86_64.rpm f0886b330d3f5af566af6cf5572ca671 x86_64/2006.0/RPMS/lib64nspr4-static-devel-1.5.0.6-1.4.20060mdk.x86_64.rpm 10e9abdcb3f952c4db35c85fe58ad8ad x86_64/2006.0/RPMS/lib64nss3-1.5.0.6-1.4.20060mdk.x86_64.rpm 202bab2742f162d1cbd6d36720e6f7fb x86_64/2006.0/RPMS/lib64nss3-devel-1.5.0.6-1.4.20060mdk.x86_64.rpm e9aaff3090a4459b57367f4903b0458a x86_64/2006.0/RPMS/libnspr4-1.5.0.6-1.4.20060mdk.i586.rpm fa99cbc159722cc0ff9e5710f24ca599 x86_64/2006.0/RPMS/libnspr4-devel-1.5.0.6-1.4.20060mdk.i586.rpm d4d45b797ca2f2347c0409d9f956ff25 x86_64/2006.0/RPMS/libnspr4-static-devel-1.5.0.6-1.4.20060mdk.i586.rpm 8d33e72703090a911f7fd171ad9dd719 x86_64/2006.0/RPMS/libnss3-1.5.0.6-1.4.20060mdk.i586.rpm 23afd287c042c5492c210255554a6893 x86_64/2006.0/RPMS/libnss3-devel-1.5.0.6-1.4.20060mdk.i586.rpm 74811077c91dde3bc8c8bae45e5862a7 x86_64/2006.0/RPMS/mozilla-firefox-1.5.0.6-1.4.20060mdk.x86_64.rpm 75711988a67bf3f36fc08823561bb2b7 x86_64/2006.0/RPMS/mozilla-firefox-br-1.5.0.6-0.1.20060mdk.x86_64.rpm 5bd9ad43769390549ab3c4549c971db7 x86_64/2006.0/RPMS/mozilla-firefox-ca-1.5.0.6-0.1.20060mdk.x86_64.rpm dfdd808e2ec0866c15db5f1ea6a5b5bd x86_64/2006.0/RPMS/mozilla-firefox-cs-1.5.0.6-0.1.20060mdk.x86_64.rpm 1fad19f458ce0aa50e86710ed3b7fe04 x86_64/2006.0/RPMS/mozilla-firefox-da-1.5.0.6-0.1.20060mdk.x86_64.rpm 743e8d4f009ab2d2fc2e8c131244fb57 x86_64/2006.0/RPMS/mozilla-firefox-de-1.5.0.6-0.1.20060mdk.x86_64.rpm 476ee9a87f650a0ef3523a9619f9f611 x86_64/2006.0/RPMS/mozilla-firefox-devel-1.5.0.6-1.4.20060mdk.x86_64.rpm be48721cbc6e5634b50ce5b6cfe4a951 x86_64/2006.0/RPMS/mozilla-firefox-el-1.5.0.6-0.1.20060mdk.x86_64.rpm e56ce18466e20db3189e035329c606ce x86_64/2006.0/RPMS/mozilla-firefox-es-1.5.0.6-0.1.20060mdk.x86_64.rpm 489e5940c9ac9573842888ff07436e4c x86_64/2006.0/RPMS/mozilla-firefox-fi-1.5.0.6-0.1.20060mdk.x86_64.rpm 73d2eb2fc6ec99a1d3eeb94d9ddff36e x86_64/2006.0/RPMS/mozilla-firefox-fr-1.5.0.6-0.1.20060mdk.x86_64.rpm acbd3cd5f82b47a6c6cb03ebd6ca25ae x86_64/2006.0/RPMS/mozilla-firefox-ga-1.5.0.6-0.1.20060mdk.x86_64.rpm 362807f9da1130dd8da606b9ded06311 x86_64/2006.0/RPMS/mozilla-firefox-he-1.5.0.6-0.1.20060mdk.x86_64.rpm e48c991fa555d22d1f382baa83dfcae9 x86_64/2006.0/RPMS/mozilla-firefox-hu-1.5.0.6-0.1.20060mdk.x86_64.rpm 0d954f47de6d2cc58e36cd2c9ddae09c x86_64/2006.0/RPMS/mozilla-firefox-it-1.5.0.6-0.1.20060mdk.x86_64.rpm 8f615598d04985a0d60a3469ea3044ed x86_64/2006.0/RPMS/mozilla-firefox-ja-1.5.0.6-0.1.20060mdk.x86_64.rpm f4810510feb31e6195358c5ddd87252f x86_64/2006.0/RPMS/mozilla-firefox-ko-1.5.0.6-0.1.20060mdk.x86_64.rpm 537d53b7805ac84009f2ff99e3282b91 x86_64/2006.0/RPMS/mozilla-firefox-nb-1.5.0.6-0.1.20060mdk.x86_64.rpm afbc9ee04902213758bbf262b732de21 x86_64/2006.0/RPMS/mozilla-firefox-nl-1.5.0.6-0.1.20060mdk.x86_64.rpm dcef8c7676529394e5fbd4168f8e2cd6 x86_64/2006.0/RPMS/mozilla-firefox-pl-1.5.0.6-0.1.20060mdk.x86_64.rpm f4ee0e7ecba430fd3ce5e8ebeda9b5c1 x86_64/2006.0/RPMS/mozilla-firefox-pt_BR-1.5.0.6-0.1.20060mdk.x86_64.rpm 778261355184ca73cbf1aab1ce56644d x86_64/2006.0/RPMS/mozilla-firefox-ro-1.5.0.6-0.1.20060mdk.x86_64.rpm 10ca4e7f4cf10c380849ced0bf83e08b x86_64/2006.0/RPMS/mozilla-firefox-ru-1.5.0.6-0.1.20060mdk.x86_64.rpm 427cabc08ec66e1a45bc27e5625f49bb x86_64/2006.0/RPMS/mozilla-firefox-sk-1.5.0.6-0.1.20060mdk.x86_64.rpm de4e61d4fce7cd286bb4a3778cb8499f x86_64/2006.0/RPMS/mozilla-firefox-sl-1.5.0.6-0.1.20060mdk.x86_64.rpm 86e9af4c42b59e32d4e5ac0a8d1afe30 x86_64/2006.0/RPMS/mozilla-firefox-sv-1.5.0.6-0.1.20060mdk.x86_64.rpm 126b1e0826330986fbf485eabade949d x86_64/2006.0/RPMS/mozilla-firefox-tr-1.5.0.6-0.1.20060mdk.x86_64.rpm d2e6da2db277b7f5dabed3e95d4b818b x86_64/2006.0/RPMS/mozilla-firefox-zh_CN-1.5.0.6-0.1.20060mdk.x86_64.rpm a83edee07d2465cf55024ed1b7aa779f x86_64/2006.0/RPMS/mozilla-firefox-zh_TW-1.5.0.6-0.1.20060mdk.x86_64.rpm 9e33e2a0c3d4a92a0b420c417fcd3469 x86_64/2006.0/RPMS/yelp-2.10.0-6.1.20060mdk.x86_64.rpm 60279919aa5f17c2ecd9f64db87cb952 x86_64/2006.0/SRPMS/devhelp-0.10-7.1.20060mdk.src.rpm c446c046409b6697a863868fe5c64222 x86_64/2006.0/SRPMS/epiphany-1.8.5-4.1.20060mdk.src.rpm e726300336f737c8952f664bf1866d6f x86_64/2006.0/SRPMS/galeon-2.0.1-1.1.20060mdk.src.rpm e9e30596eceb0bc9a03f7880cd7d14ea x86_64/2006.0/SRPMS/gnome-doc-utils-0.4.4-2.1.20060mdk.src.rpm 4168c73cba97276fa4868b4ac2c7eb19 x86_64/2006.0/SRPMS/mozilla-firefox-1.5.0.6-1.4.20060mdk.src.rpm 6a7df29f5af703d10d7ea1fee160ac00 x86_64/2006.0/SRPMS/mozilla-firefox-br-1.5.0.6-0.1.20060mdk.src.rpm e56e14c28051ec4332cbde8dbee7bb6a x86_64/2006.0/SRPMS/mozilla-firefox-ca-1.5.0.6-0.1.20060mdk.src.rpm 1a144c86fd8db39e2801117296e15d2b x86_64/2006.0/SRPMS/mozilla-firefox-cs-1.5.0.6-0.1.20060mdk.src.rpm f4889d2ee6e07c0141b57ab9aaccae64 x86_64/2006.0/SRPMS/mozilla-firefox-da-1.5.0.6-0.1.20060mdk.src.rpm dee0f7bc91c797e880fff19e1cb05a63 x86_64/2006.0/SRPMS/mozilla-firefox-de-1.5.0.6-0.1.20060mdk.src.rpm 45724f6ceed66701392bd131feaf1f6d x86_64/2006.0/SRPMS/mozilla-firefox-el-1.5.0.6-0.1.20060mdk.src.rpm cc680cac7fea3f7f8a48a5daf86db088 x86_64/2006.0/SRPMS/mozilla-firefox-es-1.5.0.6-0.1.20060mdk.src.rpm 69b04335c21313262af4253863109cc8 x86_64/2006.0/SRPMS/mozilla-firefox-fi-1.5.0.6-0.1.20060mdk.src.rpm 2aab89244a535afcbc25271df5d6b33f x86_64/2006.0/SRPMS/mozilla-firefox-fr-1.5.0.6-0.1.20060mdk.src.rpm f1c7f71d5484c5047b1b38fc16888ae3 x86_64/2006.0/SRPMS/mozilla-firefox-ga-1.5.0.6-0.1.20060mdk.src.rpm 3963e3c3a2c38c41d9d3bc5250b124a6 x86_64/2006.0/SRPMS/mozilla-firefox-he-1.5.0.6-0.1.20060mdk.src.rpm bb54aed17a126a9e8568d49866db99ea x86_64/2006.0/SRPMS/mozilla-firefox-hu-1.5.0.6-0.1.20060mdk.src.rpm 2a1b11f2c8944bc1fc0d313d54a903cf x86_64/2006.0/SRPMS/mozilla-firefox-it-1.5.0.6-0.1.20060mdk.src.rpm 783c5b3c0fb9916e07f220110155476d x86_64/2006.0/SRPMS/mozilla-firefox-ja-1.5.0.6-0.1.20060mdk.src.rpm 895e315731fa0b453045cc39da4f5358 x86_64/2006.0/SRPMS/mozilla-firefox-ko-1.5.0.6-0.1.20060mdk.src.rpm daa0a127d2a1a3641d4e97bfb95f1647 x86_64/2006.0/SRPMS/mozilla-firefox-nb-1.5.0.6-0.1.20060mdk.src.rpm 0c778b0738b11dfd5d68be48fa6316ed x86_64/2006.0/SRPMS/mozilla-firefox-nl-1.5.0.6-0.1.20060mdk.src.rpm 7025d0118cf29e39117bd87c586e84a3 x86_64/2006.0/SRPMS/mozilla-firefox-pl-1.5.0.6-0.1.20060mdk.src.rpm 5d8b8e869f588c0f5751e9ce7addba45 x86_64/2006.0/SRPMS/mozilla-firefox-pt_BR-1.5.0.6-0.1.20060mdk.src.rpm c5148674a8c7dd1f88c5729293f899ba x86_64/2006.0/SRPMS/mozilla-firefox-ro-1.5.0.6-0.1.20060mdk.src.rpm 91d490c075473e2443e383201b961cb8 x86_64/2006.0/SRPMS/mozilla-firefox-ru-1.5.0.6-0.1.20060mdk.src.rpm 622ae4619d151bb1634113e50b30fbac x86_64/2006.0/SRPMS/mozilla-firefox-sk-1.5.0.6-0.1.20060mdk.src.rpm e6d64c14929d299e2fb52e334ae6641a x86_64/2006.0/SRPMS/mozilla-firefox-sl-1.5.0.6-0.1.20060mdk.src.rpm 20f64c6dfd6aa1450cba5002d42f53d8 x86_64/2006.0/SRPMS/mozilla-firefox-sv-1.5.0.6-0.1.20060mdk.src.rpm b93a6b548bb1cf0f8cc46dec133e81a3 x86_64/2006.0/SRPMS/mozilla-firefox-tr-1.5.0.6-0.1.20060mdk.src.rpm f5603b65b3d10fa5083934e08d2d4560 x86_64/2006.0/SRPMS/mozilla-firefox-zh_CN-1.5.0.6-0.1.20060mdk.src.rpm c0e978ea92b4a8f3aa75dad5ab7588b9 x86_64/2006.0/SRPMS/mozilla-firefox-zh_TW-1.5.0.6-0.1.20060mdk.src.rpm 93cb0acaeddb095d13b37aeb0ab4dd49 x86_64/2006.0/SRPMS/yelp-2.10.0-6.1.20060mdk.src.rpm
To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/security/advisories
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.2.2 (GNU/Linux)
iD8DBQFE41l0mqjQ0CJFipgRAu1DAJ90MqoteYoIfAj0Gqim5fxrvOw7BACg0xq5 L8QZWCg0xY3ZRacFzNTgusw= =gl6u -----END PGP SIGNATURE-----
. ZDI-06-025: Mozilla Firefox Javascript navigator Object Vulnerability http://www.zerodayinitiative.com/advisories/ZDI-06-025.html July 26, 2006
-- CVE ID: CVE-2006-3677
-- Affected Vendor: Mozilla
-- Affected Products: Firefox 1.5.0 - 1.5.0.4 SeaMonkey 1.0 - 1.0.2
-- TippingPoint(TM) IPS Customer Protection: TippingPoint IPS customers have been protected against this vulnerability since July 26, 2006 by Digital Vaccine protection filter ID 4326. More information is detailed in MFSA2006-45:
http://www.mozilla.org/security/announce/2006/mfsa2006-45.html
-- Disclosure Timeline: 2006.06.16 - Vulnerability reported to vendor 2006.07.25 - Vulnerability information provided to ZDI security partners 2006.07.26 - Digital Vaccine released to TippingPoint customers 2006.07.26 - Coordinated public release of advisory
-- Credit: This vulnerability was discovered by an anonymous researcher.
-- About the Zero Day Initiative (ZDI): Established by TippingPoint, a division of 3Com, The Zero Day Initiative (ZDI) represents a best-of-breed model for rewarding security researchers for responsibly disclosing discovered vulnerabilities.
Researchers interested in getting paid for their security research through the ZDI can find more information and sign-up at:
http://www.zerodayinitiative.com
The ZDI is unique in how the acquired vulnerability information is used. 3Com does not re-sell the vulnerability details or any exploit code. Instead, upon notifying the affected product vendor, 3Com provides its customers with zero day protection through its intrusion prevention technology. Explicit details regarding the specifics of the vulnerability are not exposed to any parties until an official vendor patch is publicly available. Furthermore, with the altruistic aim of helping to secure a broader user base, 3Com provides this vulnerability information confidentially to security vendors (including competitors) who have a vulnerability protection or mitigation product
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200607-0664", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "seamonkey", "scope": "eq", "trust": 2.2, "vendor": "mozilla", "version": "1.0.2" }, { "model": "seamonkey", "scope": "eq", "trust": 2.2, "vendor": "mozilla", "version": "1.0" }, { "model": "firefox", "scope": "eq", "trust": 2.2, "vendor": "mozilla", "version": "1.5.0.1" }, { "model": "firefox", "scope": "eq", "trust": 2.2, "vendor": "mozilla", "version": "1.5.0.4" }, { "model": "firefox", "scope": "eq", "trust": 2.2, "vendor": "mozilla", "version": "1.5.0.3" }, { "model": "firefox", "scope": "eq", "trust": 2.2, "vendor": "mozilla", "version": "1.5" }, { "model": "firefox", "scope": "eq", "trust": 2.2, "vendor": "mozilla", "version": "1.5.0.2" }, { "model": "seamonkey", "scope": "eq", "trust": 2.2, "vendor": "mozilla", "version": "1.0.1" }, { "model": null, "scope": null, "trust": 0.8, "vendor": "mozilla", "version": null }, { "model": "firefox", "scope": "lte", "trust": 0.8, "vendor": "mozilla", "version": "1.5.0.4" }, { "model": "seamonkey", "scope": "lte", "trust": 0.8, "vendor": "mozilla", "version": "1.0.2" }, { "model": "asianux server", "scope": "eq", "trust": 0.8, "vendor": "cybertrust", "version": "2.0" }, { "model": "asianux server", "scope": "eq", "trust": 0.8, "vendor": "cybertrust", "version": "2.1" }, { "model": "hp-ux", "scope": "eq", "trust": 0.8, "vendor": "hewlett packard", "version": "11.11" }, { "model": "hp-ux", "scope": "eq", "trust": 0.8, "vendor": "hewlett packard", "version": "11.23" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "2.1 (as)" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "2.1 (es)" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "2.1 (ws)" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "3 (as)" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "3 (es)" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "3 (ws)" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "4 (as)" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "4 (es)" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "4 (ws)" }, { "model": "enterprise linux desktop", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "3.0" }, { "model": "enterprise linux desktop", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "4.0" }, { "model": "linux advanced workstation", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "2.1" }, { "model": "1.5.x", "scope": null, "trust": 0.7, "vendor": "mozilla firefox", "version": null }, { "model": "hp-ux b.11.23", "scope": null, "trust": 0.6, "vendor": "hp", "version": null }, { "model": "enterprise linux ws", "scope": "eq", "trust": 0.6, "vendor": "redhat", "version": "2.1" }, { "model": "linux amd64", "scope": "eq", "trust": 0.6, "vendor": "ubuntu", "version": "5.10" }, { "model": "linux sparc", "scope": "eq", "trust": 0.6, "vendor": "ubuntu", "version": "5.10" }, { "model": "linux", "scope": "eq", "trust": 0.6, "vendor": "rpath", "version": "1" }, { "model": "linux lts powerpc", "scope": "eq", "trust": 0.6, "vendor": "ubuntu", "version": "6.06" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.6, "vendor": "ubuntu", "version": "5.10" }, { "model": "linux mandrake", "scope": "eq", "trust": 0.6, "vendor": "mandriva", "version": "2006.0" }, { "model": "linux i386", "scope": "eq", "trust": 0.6, "vendor": "ubuntu", "version": "5.10" }, { "model": "enterprise linux es", "scope": "eq", "trust": 0.6, "vendor": "redhat", "version": "4" }, { "model": "enterprise linux es", "scope": "eq", "trust": 0.6, "vendor": "redhat", "version": "3" }, { "model": "advanced workstation for the itanium processor", "scope": "eq", "trust": 0.6, "vendor": "redhat", "version": "2.1" }, { "model": "enterprise linux ws ia64", "scope": "eq", "trust": 0.6, "vendor": "redhat", "version": "2.1" }, { "model": "linux lts i386", "scope": "eq", "trust": 0.6, "vendor": "ubuntu", "version": "6.06" }, { "model": "firefox beta", "scope": "eq", "trust": 0.6, "vendor": "mozilla", "version": "1.52" }, { "model": "linux lts amd64", "scope": "eq", "trust": 0.6, "vendor": "ubuntu", "version": "6.06" }, { "model": "seamonkey", "scope": "ne", "trust": 0.6, "vendor": "mozilla", "version": "1.0.3" }, { "model": "linux -current", "scope": null, "trust": 0.6, "vendor": "slackware", "version": null }, { "model": "enterprise linux es", "scope": "eq", "trust": 0.6, "vendor": "redhat", "version": "2.1" }, { "model": "desktop", "scope": "eq", "trust": 0.6, "vendor": "redhat", "version": "4.0" }, { "model": "linux lts sparc", "scope": "eq", "trust": 0.6, "vendor": "ubuntu", "version": "6.06" }, { "model": "advanced workstation for the itanium processor ia64", "scope": "eq", "trust": 0.6, "vendor": "redhat", "version": "2.1" }, { "model": "linux", "scope": "eq", "trust": 0.6, "vendor": "slackware", "version": "10.2" }, { "model": "linux", "scope": null, "trust": 0.6, "vendor": "gentoo", "version": null }, { "model": "firefox beta", "scope": "eq", "trust": 0.6, "vendor": "mozilla", "version": "1.51" }, { "model": "enterprise linux as ia64", "scope": "eq", "trust": 0.6, "vendor": "redhat", "version": "2.1" }, { "model": "linux mandrake x86 64", "scope": "eq", "trust": 0.6, "vendor": "mandriva", "version": "2006.0" }, { "model": "enterprise linux as", "scope": "eq", "trust": 0.6, "vendor": "redhat", "version": "4" }, { "model": "enterprise linux as", "scope": "eq", "trust": 0.6, "vendor": "redhat", "version": "3" }, { "model": "hp-ux b.11.11", "scope": null, "trust": 0.6, "vendor": "hp", "version": null }, { "model": "firefox", "scope": "ne", "trust": 0.6, "vendor": "mozilla", "version": "1.5.0.5" }, { "model": "hp-ux b.11.31", "scope": null, "trust": 0.6, "vendor": "hp", "version": null }, { "model": "enterprise linux ws", "scope": "eq", "trust": 0.6, "vendor": "redhat", "version": "4" }, { "model": "enterprise linux ws", "scope": "eq", "trust": 0.6, "vendor": "redhat", "version": "3" }, { "model": "seamonkey dev", "scope": "eq", "trust": 0.6, "vendor": "mozilla", "version": "1.0" }, { "model": "desktop", "scope": "eq", "trust": 0.6, "vendor": "redhat", "version": "3.0" }, { "model": "enterprise linux es ia64", "scope": "eq", "trust": 0.6, "vendor": "redhat", "version": "2.1" }, { "model": "enterprise linux as", "scope": "eq", "trust": 0.6, "vendor": "redhat", "version": "2.1" }, { "model": "linux ppc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.1" }, { "model": "thunderbird", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "1.0.8" }, { "model": "linux enterprise server", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "10" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "1.0.2" }, { "model": "thunderbird", "scope": "ne", "trust": 0.3, "vendor": "mozilla", "version": "1.5.0.4" }, { "model": "thunderbird beta", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "1.52" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "1.0" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "0.8" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "5.04" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "1.0.1" }, { "model": "linux personal", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.3" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "0.9.1" }, { "model": "linux m68k", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.1" }, { "model": "solaris", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "10.0" }, { "model": "thunderbird", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "0.9" }, { "model": "thunderbird", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "1.0.6" }, { "model": "linux ia-64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.1" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "0.10" }, { "model": "linux hppa", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.1" }, { "model": "thunderbird", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "1.5" }, { "model": "thunderbird", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "0.7.2" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "0.9.2" }, { "model": "linux personal x86 64", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.3" }, { "model": "thunderbird", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "1.5.0.2" }, { "model": "solaris 8 sparc", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "thunderbird", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "0.7.1" }, { "model": "solaris", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "9" }, { "model": "thunderbird", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "0.6" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "1.0.7" }, { "model": "firefox preview release", "scope": null, "trust": 0.3, "vendor": "mozilla", "version": null }, { "model": "linux professional", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "10.0" }, { "model": "thunderbird", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "0.7.3" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "1.0.8" }, { "model": "linux professional oss", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "10.0" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.1" }, { "model": "linux professional x86 64", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.3" }, { "model": "corporate server x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "3.0" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "1.0.3" }, { "model": "thunderbird", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "1.0.5" }, { "model": "solaris 8 x86", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "linux professional", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "10.1" }, { "model": "linux alpha", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.1" }, { "model": "thunderbird", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "1.0.2" }, { "model": "thunderbird", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "0.7" }, { "model": "solaris 10.0 x86", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "linux personal", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.2" }, { "model": "thunderbird", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "1.0" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "0.9" }, { "model": "thunderbird", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "0.8" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "1.0.6" }, { "model": "linux professional", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.3" }, { "model": "solaris", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "10" }, { "model": "thunderbird", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "1.0.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "0.10.1" }, { "model": "thunderbird", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "1.5.0.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "1.0.4" }, { "model": "firefox rc", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "0.9" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "5.04" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.1" }, { "model": "propack sp6", "scope": "eq", "trust": 0.3, "vendor": "sgi", "version": "3.0" }, { "model": "novell linux desktop", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.0" }, { "model": "solaris 10 x86", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "linux personal x86 64", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.2" }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "5.04" }, { "model": "linux enterprise sdk", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "10" }, { "model": "linux ia-32", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.1" }, { "model": "solaris 9 x86", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "0.9.3" }, { "model": "linux mipsel", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.1" }, { "model": "linux mips", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.1" }, { "model": "corporate server", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "3.0" }, { "model": "linux professional", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.2" }, { "model": "interactive response", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "2.0" }, { "model": "linux arm", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.1" }, { "model": "linux professional x86 64", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.2" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "1.0.5" }, { "model": "linux s/390", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.1" }, { "model": "thunderbird", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "1.0.7" }, { "model": "k-meleon", "scope": "eq", "trust": 0.3, "vendor": "k meleon", "version": "1.0" }, { "model": "camino", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "0.7.0" }, { "model": "camino", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "0.8.4" }, { "model": "camino", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "1.0.2" }, { "model": "camino", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "1.0" }, { "model": "camino", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "0.8" }, { "model": "browser", "scope": "eq", "trust": 0.3, "vendor": "netscape", "version": "8.1" }, { "model": "camino", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "1.0.1" }, { "model": "camino", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "0.8.3" }, { "model": "flock", "scope": "eq", "trust": 0.3, "vendor": "flock", "version": "0.7.32" } ], "sources": [ { "db": "CERT/CC", "id": "VU#670060" }, { "db": "ZDI", "id": "ZDI-06-025" }, { "db": "BID", "id": "19181" }, { "db": "BID", "id": "19192" }, { "db": "JVNDB", "id": "JVNDB-2006-000445" }, { "db": "CNNVD", "id": "CNNVD-200607-482" }, { "db": "NVD", "id": "CVE-2006-3677" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:mozilla:firefox", "vulnerable": true }, { "cpe22Uri": "cpe:/a:mozilla:seamonkey", "vulnerable": true }, { "cpe22Uri": "cpe:/o:misc:miraclelinux_asianux_server", "vulnerable": true }, { "cpe22Uri": "cpe:/o:hp:hp-ux", "vulnerable": true }, { "cpe22Uri": "cpe:/o:redhat:enterprise_linux", "vulnerable": true }, { "cpe22Uri": "cpe:/o:redhat:enterprise_linux_desktop", "vulnerable": true }, { "cpe22Uri": "cpe:/o:redhat:linux_advanced_workstation", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2006-000445" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Anonymous", "sources": [ { "db": "ZDI", "id": "ZDI-06-025" } ], "trust": 0.7 }, "cve": "CVE-2006-3677", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2006-3677", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-19785", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2006-3677", "trust": 1.0, "value": "HIGH" }, { "author": "CARNEGIE MELLON", "id": "VU#670060", "trust": 0.8, "value": "58.14" }, { "author": "NVD", "id": "CVE-2006-3677", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-200607-482", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-19785", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CERT/CC", "id": "VU#670060" }, { "db": "VULHUB", "id": "VHN-19785" }, { "db": "JVNDB", "id": "JVNDB-2006-000445" }, { "db": "CNNVD", "id": "CNNVD-200607-482" }, { "db": "NVD", "id": "CVE-2006-3677" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Mozilla Firefox 1.5 before 1.5.0.5 and SeaMonkey before 1.0.3 allows remote attackers to execute arbitrary code by changing certain properties of the window navigator object (window.navigator) that are accessed when Java starts up, which causes a crash that leads to code execution. Mozilla products fail to properly release memory. This vulnerability may allow a remote attacker to execute arbitrary code on a vulnerable system. User interaction is required to exploit this vulnerability in that the target must visit a malicious page.The flaw exists when assigning specific values to the window.navigator object. A lack of checking on assignment causes user supplied data to be later used in the creation of other objects leading to eventual code execution. The Mozilla Foundation has released thirteen security advisories specifying vulnerabilities in Mozilla Firefox, SeaMonkey, and Thunderbird. \nOther attacks may also be possible. \nThe issues described here will be split into individual BIDs as more information becomes available. \nThese issues are fixed in:\n- Mozilla Firefox 1.5.0.5\n- Mozilla Thunderbird 1.5.0.5\n- Mozilla SeaMonkey 1.0.3. Mozilla Firefox is prone to a remote code-execution vulnerability because the application fails to properly sanitize user-supplied input before using it to create new JavaScript objects. \nThis issue was previously discussed in BID 19181 (Mozilla Multiple Products Remote Vulnerabilities). =========================================================== \nUbuntu Security Notice USN-327-1 July 27, 2006\nfirefox vulnerabilities\nCVE-2006-3113, CVE-2006-3677, CVE-2006-3801, CVE-2006-3802,\nCVE-2006-3803, CVE-2006-3805, CVE-2006-3806, CVE-2006-3807,\nCVE-2006-3808, CVE-2006-3809, CVE-2006-3810, CVE-2006-3811,\nCVE-2006-3812\n===========================================================\n\nA security issue affects the following Ubuntu releases:\n\nUbuntu 6.06 LTS\n\nThis advisory also applies to the corresponding versions of\nKubuntu, Edubuntu, and Xubuntu. \n\nThe problem can be corrected by upgrading your system to the\nfollowing package versions:\n\nUbuntu 6.06 LTS:\n firefox 1.5.dfsg+1.5.0.5-0ubuntu6.06\n\nAfter a standard system upgrade you need to restart Firefox to effect\nthe necessary changes. \n\nPlease note that Firefox 1.0.8 in Ubuntu 5.10 and Ubuntu 5.04 are also\naffected by these problems. Updates for these Ubuntu releases will be\ndelayed due to upstream dropping support for this Firefox version. We\nstrongly advise that you disable JavaScript to disable the attack\nvectors for most vulnerabilities if you use one of these Ubuntu\nversions. (CVE-2006-3113, CVE-2006-3677, CVE-2006-3801,\nCVE-2006-3803, CVE-2006-3805, CVE-2006-3806, CVE-2006-3807,\nCVE-2006-3809, CVE-2006-3811, CVE-2006-3812)\n\ncross-site scripting vulnerabilities were found in the\nXPCNativeWrapper() function and native DOM method handlers. A\nmalicious web site could exploit these to modify the contents or steal\nconfidential data (such as passwords) from other opened web pages. \n(CVE-2006-3802, CVE-2006-3810)\n\nA bug was found in the script handler for automatic proxy\nconfiguration. (CVE-2006-3808)\n\nPlease see \n\n http://www.mozilla.org/projects/security/known-vulnerabilities.html#Firefox\n\nfor technical details of these vulnerabilities. \n\n\nUpdated packages for Ubuntu 6.06 LTS:\n\n Source archives:\n\n http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.5-0ubuntu6.06.diff.gz\n Size/MD5: 174602 7be6f5862219ac4cf44f05733f372f2b\n http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.5-0ubuntu6.06.dsc\n Size/MD5: 1109 252d6acf45b009008a6bc88166e2632f\n http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.5.orig.tar.gz\n Size/MD5: 44067762 749933c002e158576ec15782fc451e43\n\n Architecture independent packages:\n\n http://security.ubuntu.com/ubuntu/pool/universe/f/firefox/mozilla-firefox-dev_1.5.dfsg+1.5.0.5-0ubuntu6.06_all.deb\n Size/MD5: 49190 850dd650e7f876dd539e605d9b3026c8\n http://security.ubuntu.com/ubuntu/pool/main/f/firefox/mozilla-firefox_1.5.dfsg+1.5.0.5-0ubuntu6.06_all.deb\n Size/MD5: 50078 c1fa4a40187d9c5b58bd049edb00ce54\n\n amd64 architecture (Athlon64, Opteron, EM64T Xeon)\n\n http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dbg_1.5.dfsg+1.5.0.5-0ubuntu6.06_amd64.deb\n Size/MD5: 47269292 167aadc3f03b4e1b7cb9ed826e672983\n http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dev_1.5.dfsg+1.5.0.5-0ubuntu6.06_amd64.deb\n Size/MD5: 2796768 b54592d0bd736f6ee12a90987771bc59\n http://security.ubuntu.com/ubuntu/pool/universe/f/firefox/firefox-dom-inspector_1.5.dfsg+1.5.0.5-0ubuntu6.06_amd64.deb\n Size/MD5: 216136 79fa6c69ffb0dd6037e56d1ba538ff64\n http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-gnome-support_1.5.dfsg+1.5.0.5-0ubuntu6.06_amd64.deb\n Size/MD5: 82358 e2e026d582a7b5352cee4453cef0fe45\n http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.5-0ubuntu6.06_amd64.deb\n Size/MD5: 9400544 a9d0b804a4374dc636bb79968a2bce5c\n http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnspr-dev_1.firefox1.5.dfsg+1.5.0.5-0ubuntu6.06_amd64.deb\n Size/MD5: 218822 a09476caea7d8d73d6a2f534bd494493\n http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnspr4_1.firefox1.5.dfsg+1.5.0.5-0ubuntu6.06_amd64.deb\n Size/MD5: 161876 0e0e65348dba8167b4891b173baa8f0d\n http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnss-dev_1.firefox1.5.dfsg+1.5.0.5-0ubuntu6.06_amd64.deb\n Size/MD5: 235746 064fc1434a315f857ee92f60fd49d772\n http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnss3_1.firefox1.5.dfsg+1.5.0.5-0ubuntu6.06_amd64.deb\n Size/MD5: 757458 bd6a5e28e05a04a5deca731ab29f70e4\n\n i386 architecture (x86 compatible Intel/AMD)\n\n http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dbg_1.5.dfsg+1.5.0.5-0ubuntu6.06_i386.deb\n Size/MD5: 43837610 a7e4a535262f8a5d5cb0ace7ed785237\n http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dev_1.5.dfsg+1.5.0.5-0ubuntu6.06_i386.deb\n Size/MD5: 2796700 4509dbf62e3fd2cda7168c20aa65ba4f\n http://security.ubuntu.com/ubuntu/pool/universe/f/firefox/firefox-dom-inspector_1.5.dfsg+1.5.0.5-0ubuntu6.06_i386.deb\n Size/MD5: 209546 50e174c1c7290fca51f9e1ee71ebb56c\n http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-gnome-support_1.5.dfsg+1.5.0.5-0ubuntu6.06_i386.deb\n Size/MD5: 74732 25ba86caeeb1a88da4493875178a3636\n http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.5-0ubuntu6.06_i386.deb\n Size/MD5: 7916536 40ebfe4330af25c2359f8b25b039ed5e\n http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnspr-dev_1.firefox1.5.dfsg+1.5.0.5-0ubuntu6.06_i386.deb\n Size/MD5: 218822 6066f59acbce1b4de2dc284b5801efc5\n http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnspr4_1.firefox1.5.dfsg+1.5.0.5-0ubuntu6.06_i386.deb\n Size/MD5: 146570 c1a5c5cc4371b228093d03d9ed7ad607\n http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnss-dev_1.firefox1.5.dfsg+1.5.0.5-0ubuntu6.06_i386.deb\n Size/MD5: 235754 0e9a1a89f63a9869b875ee6a50547c2b\n http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnss3_1.firefox1.5.dfsg+1.5.0.5-0ubuntu6.06_i386.deb\n Size/MD5: 669556 d537a4771b80e5c06f18b2c5d7e5d384\n\n powerpc architecture (Apple Macintosh G3/G4/G5)\n\n http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dbg_1.5.dfsg+1.5.0.5-0ubuntu6.06_powerpc.deb\n Size/MD5: 48648192 479d29e08ff2b9cef89a6da3285c0aad\n http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dev_1.5.dfsg+1.5.0.5-0ubuntu6.06_powerpc.deb\n Size/MD5: 2796790 60b97738bfc3b8b32914487bb4aba239\n http://security.ubuntu.com/ubuntu/pool/universe/f/firefox/firefox-dom-inspector_1.5.dfsg+1.5.0.5-0ubuntu6.06_powerpc.deb\n Size/MD5: 212982 a396e119a32303afc024d513b997c84e\n http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-gnome-support_1.5.dfsg+1.5.0.5-0ubuntu6.06_powerpc.deb\n Size/MD5: 77894 ef7841bb2ab8de0e0c44e59c893b1622\n http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.5-0ubuntu6.06_powerpc.deb\n Size/MD5: 9019132 ed3927484eea5fccf84a2840640febf3\n http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnspr-dev_1.firefox1.5.dfsg+1.5.0.5-0ubuntu6.06_powerpc.deb\n Size/MD5: 218826 a2338c3c8064a304deb752bf32a291f8\n http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnspr4_1.firefox1.5.dfsg+1.5.0.5-0ubuntu6.06_powerpc.deb\n Size/MD5: 159112 7d5d6100727ceb894695b219cec11e43\n http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnss-dev_1.firefox1.5.dfsg+1.5.0.5-0ubuntu6.06_powerpc.deb\n Size/MD5: 235754 69085beb145222fea07d2d6c19158a2d\n http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnss3_1.firefox1.5.dfsg+1.5.0.5-0ubuntu6.06_powerpc.deb\n Size/MD5: 768332 8dc6cc8c54185d57af14bab3bee39f9d\n\n sparc architecture (Sun SPARC/UltraSPARC)\n\n http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dbg_1.5.dfsg+1.5.0.5-0ubuntu6.06_sparc.deb\n Size/MD5: 45235424 f5a07188af5802fffbd3cfdd64b109cf\n http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dev_1.5.dfsg+1.5.0.5-0ubuntu6.06_sparc.deb\n Size/MD5: 2796756 cb13c7ea0e3b7af2f1e12db1f8dc38a2\n http://security.ubuntu.com/ubuntu/pool/universe/f/firefox/firefox-dom-inspector_1.5.dfsg+1.5.0.5-0ubuntu6.06_sparc.deb\n Size/MD5: 210488 17f7723b697110c8f132422bc059d447\n http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-gnome-support_1.5.dfsg+1.5.0.5-0ubuntu6.06_sparc.deb\n Size/MD5: 76340 c38ccb8b71b9c3783a1c9816ecd9cf5d\n http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.5-0ubuntu6.06_sparc.deb\n Size/MD5: 8411310 4b3865b2df3924d094e0b18f207bf33d\n http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnspr-dev_1.firefox1.5.dfsg+1.5.0.5-0ubuntu6.06_sparc.deb\n Size/MD5: 218814 a0e67d0d425cea2cd5835e2c2faa930f\n http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnspr4_1.firefox1.5.dfsg+1.5.0.5-0ubuntu6.06_sparc.deb\n Size/MD5: 149018 73108368f0ef745188ebd1c48ea10c88\n http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnss-dev_1.firefox1.5.dfsg+1.5.0.5-0ubuntu6.06_sparc.deb\n Size/MD5: 235746 695a6122710fb30201daaa239ba6d48d\n http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnss3_1.firefox1.5.dfsg+1.5.0.5-0ubuntu6.06_sparc.deb\n Size/MD5: 681612 896721beb3cdcea12bab98223c0796c2\n. \n\n-----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n National Cyber Alert System\n\n Technical Cyber Security Alert TA06-208A\n\n\nMozilla Products Contain Multiple Vulnerabilities\n\n Original release date: July 27, 2006\n Last revised: --\n Source: US-CERT\n\n\nSystems Affected\n\n * Mozilla SeaMonkey\n * Mozilla Firefox\n * Mozilla Thunderbird\n\n Any products based on Mozilla components, specifically Gecko, may also\n be affected. \n\n\nI. \n (CVE-2006-3805)\n\n\n VU#655892 - Mozilla JavaScript engine contains multiple integer\n overflows \n\n The Mozilla JavaScript engine contains multiple integer overflows. \n (CVE-2006-3811)\n\n\nII. \n\n\nIII. \n\nDisable JavaScript and Java\n\n These vulnerabilities can be mitigated by disabling JavaScript and\n Java in all affected products. Instructions for disabling Java in\n Firefox can be found in the \"Securing Your Web Browser\" document. \n\n\nAppendix A. Please send\n email to \u003ccert@cert.org\u003e with \"TA06-208A Feedback VU#239124\" in the\n subject. \n ____________________________________________________________________\n\n For instructions on subscribing to or unsubscribing from this\n mailing list, visit \u003chttp://www.us-cert.gov/cas/signup.html\u003e. \n ____________________________________________________________________\n\n Produced 2006 by US-CERT, a government organization. \n\n Terms of use:\n\n \u003chttp://www.us-cert.gov/legal.html\u003e\n ____________________________________________________________________\n\n\nRevision History\n\n Jul 27, 2006: Initial release\n\n\n \n \n\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.2.1 (GNU/Linux)\n\niQEVAwUBRMkgNexOF3G+ig+rAQIFsAgAoWoMkxxhkzb+xgLVCJF7h4k4EBCgJGWa\nBSOiFfL4Gs4vv4lNooDRCIOdxiBfXYL71XsIOT4aWry5852/6kyYnyAiXXYj1Uv0\nSbPY2sQSZ5EaG+G9i8HDIy3fpJN4XgH3ng1uzUnJihY19IfndbXicpZE+debIUri\nqt9NRD2f5FW5feKo1cBpYxtmxQAEePOa2dJHh7I7cnFGtG3MixHx4kVEyuYUutCX\n5tHDsfTIdySNkIdCQ4vhk846bErB/kaHiKMQDfMglllb3GOSc07OQ0CDo2eTPVsA\n9DtKkiDP1C4dh1mxco8CWlS6327+EB0KXGGoqDF2+j/rrpsW0oc8nA==\n=HwuK\n-----END PGP SIGNATURE-----\n. \n\nBackground\n==========\n\nThe Mozilla SeaMonkey project is a community effort to deliver\nproduction-quality releases of code derived from the application\nformerly known as \"Mozilla Application Suite\". The\ngoal is to produce a cross-platform stand-alone browser application. \n\nAffected packages\n=================\n\n -------------------------------------------------------------------\n Package / Vulnerable / Unaffected\n -------------------------------------------------------------------\n 1 www-client/mozilla-firefox \u003c 1.5.0.5 \u003e= 1.5.0.5\n 2 www-client/mozilla-firefox-bin \u003c 1.5.0.5 \u003e= 1.5.0.5\n -------------------------------------------------------------------\n 2 affected packages on all of their supported architectures. \n\n* Developers in the Mozilla community looked for and fixed several\n crash bugs to improve the stability of Mozilla clients. \n\n* \"shutdown\" reports that cross-site scripting (XSS) attacks could be\n performed using the construct XPCNativeWrapper(window).Function(...),\n which created a function that appeared to belong to the window in\n question even after it had been navigated to the target site. \n\n* \"shutdown\" reports that scripts granting the UniversalBrowserRead\n privilege can leverage that into the equivalent of the far more\n powerful UniversalXPConnect since they are allowed to \"read\" into a\n privileged context. \n\n* \"moz_bug_r_a4\" reports that A malicious Proxy AutoConfig (PAC)\n server could serve a PAC script that can execute code with elevated\n privileges by setting the required FindProxyForURL function to the\n eval method on a privileged object that leaked into the PAC sandbox. \n\n* \"moz_bug_r_a4\" discovered that Named JavaScript functions have a\n parent object created using the standard Object() constructor\n (ECMA-specified behavior) and that this constructor can be redefined\n by script (also ECMA-specified behavior). \n\n* Igor Bukanov and shutdown found additional places where an untimely\n garbage collection could delete a temporary object that was in active\n use. \n\n* Georgi Guninski found potential integer overflow issues with long\n strings in the toSource() methods of the Object, Array and String\n objects as well as string function arguments. \n\n* H. D. Moore reported a testcase that was able to trigger a race\n condition where JavaScript garbage collection deleted a temporary\n variable still being used in the creation of a new Function object. \n\n* A malicious page can hijack native DOM methods on a document object\n in another domain, which will run the attacker\u0027s script when called\n by the victim page. This leads to use of a deleted timer object. \n\n* An anonymous researcher for TippingPoint and the Zero Day\n Initiative showed that when used in a web page Java would reference\n properties of the window.navigator object as it started up. \n\n* Thilo Girmann discovered that in certain circumstances a JavaScript\n reference to a frame or window was not properly cleared when the\n referenced content went away. \n\nImpact\n======\n\nA user can be enticed to open specially crafted URLs, visit webpages\ncontaining malicious JavaScript or execute a specially crafted script. \n\nWorkaround\n==========\n\nThere is no known workaround at this time. \n\nResolution\n==========\n\nAll Mozilla Firefox users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose\n\"\u003e=www-client/mozilla-firefox-1.5.0.5\"\n\nUsers of the binary package should upgrade as well:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose\n\"\u003e=www-client/mozilla-firefox-bin-1.5.0.5\"\n\nReferences\n==========\n\n [ 1 ] CVE-2006-3113\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3113\n [ 2 ] CVE-2006-3677\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3677\n [ 3 ] CVE-2006-3801\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3801\n [ 4 ] CVE-2006-3802\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3802\n [ 5 ] CVE-2006-3803\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3803\n [ 6 ] CVE-2006-3805\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3805\n [ 7 ] CVE-2006-3806\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3806\n [ 8 ] CVE-2006-3807\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3807\n [ 9 ] CVE-2006-3808\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3808\n [ 10 ] CVE-2006-3809\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3809\n [ 11 ] CVE-2006-3810\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3810\n [ 12 ] CVE-2006-3811\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3811\n [ 13 ] CVE-2006-3812\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3812\n\nAvailability\n============\n\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n http://security.gentoo.org/glsa/glsa-200608-03.xml\n\nConcerns?\n=========\n\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users machines is of utmost\nimportance to us. Any security concerns should be addressed to\nsecurity@gentoo.org or alternatively, you may file a bug at\nhttp://bugs.gentoo.org. \n\nLicense\n=======\n\nCopyright 2006 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttp://creativecommons.org/licenses/by-sa/2.5\n\n\n. \n\n----------------------------------------------------------------------\n\nHardcore Disassembler / Reverse Engineer Wanted!\n\nWant to work with IDA and BinDiff?\nWant to write PoC\u0027s and Exploits?\n\nYour nationality is not important. \nWe will get you a work permit, find an apartment, and offer a\nrelocation compensation package. \n\nFor more information, see vulnerabilities #1, #3, #4, #5, #6, #7, #9,\n#10, and #11:\nSA19783\n\nSuccessful exploitation of these vulnerabilities requires that\nJavaScript is enabled in mails (not default setting). \n\nA boundary error has also been reported in the handling of VCard\nattachments. This can be exploited to cause a heap-based buffer\noverflow via a malicious VCard with a specially crafted base64 field\nthat causes a crash and may allow execution of arbitrary code. \n\nSOLUTION:\nUpdate to version 1.5.0.5. \n\nPROVIDED AND/OR DISCOVERED BY:\nDaniel Veditz, Mozilla. \n\nORIGINAL ADVISORY:\nhttp://www.mozilla.org/security/announce/2006/mfsa2006-49.html\n\nOTHER REFERENCES:\nSA19783:\nhttp://secunia.com/advisories/19873/\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n. \n \n Previous updates to Firefox were patch fixes to Firefox 1.0.6 that\n brought it in sync with 1.0.8 in terms of security fixes. In this\n update, Mozilla Firefox 1.5.0.6 is being provided which corrects a\n number of vulnerabilities that were previously unpatched, as well as\n providing new and enhanced features. \n \n The following CVE names have been corrected with this update:\n CVE-2006-2613, CVE-2006-2894, CVE-2006-2775, CVE-2006-2776,\n CVE-2006-2777, CVE-2006-2778, CVE-2006-2779, CVE-2006-2780,\n CVE-2006-2782, CVE-2006-2783, CVE-2006-2784, CVE-2006-2785, \n CVE-2006-2786, CVE-2006-2787, CVE-2006-2788, CVE-2006-3677,\n CVE-2006-3803, CVE-2006-3804, CVE-2006-3806, CVE-2006-3807,\n CVE-2006-3113, CVE-2006-3801, CVE-2006-3802, CVE-2006-3805,\n CVE-2006-3808, CVE-2006-3809, CVE-2006-3810, CVE-2006-3811,\n CVE-2006-3812. \n _______________________________________________________________________\n\n References:\n \n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2613\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2894\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2775\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2776\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2777\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2778\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2779\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2780\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2782\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2783\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2784\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2785\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2786\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2787\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2788\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3677\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3803\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3804\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3806\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3807\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3113\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3801\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3802\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3805\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3808\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3809\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3810\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3811\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3812\n http://www.mozilla.org/security/announce/2006/mfsa2006-31.html\n http://www.mozilla.org/security/announce/2006/mfsa2006-32.html\n http://www.mozilla.org/security/announce/2006/mfsa2006-33.html\n http://www.mozilla.org/security/announce/2006/mfsa2006-34.html\n http://www.mozilla.org/security/announce/2006/mfsa2006-35.html\n http://www.mozilla.org/security/announce/2006/mfsa2006-36.html\n http://www.mozilla.org/security/announce/2006/mfsa2006-37.html\n http://www.mozilla.org/security/announce/2006/mfsa2006-38.html\n http://www.mozilla.org/security/announce/2006/mfsa2006-39.html\n http://www.mozilla.org/security/announce/2006/mfsa2006-41.html\n http://www.mozilla.org/security/announce/2006/mfsa2006-42.html\n http://www.mozilla.org/security/announce/2006/mfsa2006-43.html\n http://www.mozilla.org/security/announce/2006/mfsa2006-44.html\n http://www.mozilla.org/security/announce/2006/mfsa2006-45.html\n http://www.mozilla.org/security/announce/2006/mfsa2006-46.html\n http://www.mozilla.org/security/announce/2006/mfsa2006-47.html\n http://www.mozilla.org/security/announce/2006/mfsa2006-48.html\n http://www.mozilla.org/security/announce/2006/mfsa2006-50.html\n http://www.mozilla.org/security/announce/2006/mfsa2006-51.html\n http://www.mozilla.org/security/announce/2006/mfsa2006-52.html\n http://www.mozilla.org/security/announce/2006/mfsa2006-53.html\n http://www.mozilla.org/security/announce/2006/mfsa2006-54.html\n http://www.mozilla.org/security/announce/2006/mfsa2006-55.html\n http://www.mozilla.org/security/announce/2006/mfsa2006-56.html\n _______________________________________________________________________\n \n Updated Packages:\n \n Mandriva Linux 2006.0:\n 76ef1a2e7338c08e485ab2c19a1ce691 2006.0/RPMS/devhelp-0.10-7.1.20060mdk.i586.rpm\n d44f02b82df9f404f899ad8bc4bdd6a2 2006.0/RPMS/epiphany-1.8.5-4.1.20060mdk.i586.rpm\n 29efc065aeb4a53a105b2c27be816758 2006.0/RPMS/epiphany-devel-1.8.5-4.1.20060mdk.i586.rpm\n caad34c0d4c16a50ec4b05820e6d01db 2006.0/RPMS/galeon-2.0.1-1.1.20060mdk.i586.rpm\n d0e75938f4e129936351f015bd90a37a 2006.0/RPMS/gnome-doc-utils-0.4.4-2.1.20060mdk.noarch.rpm\n 652044ff7d9c3170df845011ec696393 2006.0/RPMS/libdevhelp-1_0-0.10-7.1.20060mdk.i586.rpm\n bf6dcf87f409d06b42234dbca387b922 2006.0/RPMS/libdevhelp-1_0-devel-0.10-7.1.20060mdk.i586.rpm\n e9aaff3090a4459b57367f4903b0458a 2006.0/RPMS/libnspr4-1.5.0.6-1.4.20060mdk.i586.rpm\n fa99cbc159722cc0ff9e5710f24ca599 2006.0/RPMS/libnspr4-devel-1.5.0.6-1.4.20060mdk.i586.rpm\n d4d45b797ca2f2347c0409d9f956ff25 2006.0/RPMS/libnspr4-static-devel-1.5.0.6-1.4.20060mdk.i586.rpm\n 8d33e72703090a911f7fd171ad9dd719 2006.0/RPMS/libnss3-1.5.0.6-1.4.20060mdk.i586.rpm\n 23afd287c042c5492c210255554a6893 2006.0/RPMS/libnss3-devel-1.5.0.6-1.4.20060mdk.i586.rpm\n 4a188f54230b943ea9c8930eb2e0cfe1 2006.0/RPMS/mozilla-firefox-1.5.0.6-1.4.20060mdk.i586.rpm\n 5bec4690547fd733ca97cb2933ebe427 2006.0/RPMS/mozilla-firefox-br-1.5.0.6-0.1.20060mdk.i586.rpm\n 55836595e5cba3828a9a5a27e5aa1825 2006.0/RPMS/mozilla-firefox-ca-1.5.0.6-0.1.20060mdk.i586.rpm\n 0faf5ee7022ee0b70915d2c845865cae 2006.0/RPMS/mozilla-firefox-cs-1.5.0.6-0.1.20060mdk.i586.rpm\n 312a89317692b3bd86060a1995365d86 2006.0/RPMS/mozilla-firefox-da-1.5.0.6-0.1.20060mdk.i586.rpm\n 38215dccbee8a169bcbac2af2897c2f7 2006.0/RPMS/mozilla-firefox-de-1.5.0.6-0.1.20060mdk.i586.rpm\n aaba2fa72f8de960a3a757b3010027d3 2006.0/RPMS/mozilla-firefox-devel-1.5.0.6-1.4.20060mdk.i586.rpm\n d8d59a55974f6fa20d99fb30f126638f 2006.0/RPMS/mozilla-firefox-el-1.5.0.6-0.1.20060mdk.i586.rpm\n 946e6a76c71dbbee3340f1a96ae25a1d 2006.0/RPMS/mozilla-firefox-es-1.5.0.6-0.1.20060mdk.i586.rpm\n 9a14c31a41c2bac3942caa3d1fb5daee 2006.0/RPMS/mozilla-firefox-fi-1.5.0.6-0.1.20060mdk.i586.rpm\n b5074c27d1cb719bf9f8fabe8aebf628 2006.0/RPMS/mozilla-firefox-fr-1.5.0.6-0.1.20060mdk.i586.rpm\n 7a225cdfdf0c17c0f4a72ad27907fc07 2006.0/RPMS/mozilla-firefox-ga-1.5.0.6-0.1.20060mdk.i586.rpm\n 06526a054d108d3c9b5f66313151ecc2 2006.0/RPMS/mozilla-firefox-he-1.5.0.6-0.1.20060mdk.i586.rpm\n 8f721bd3914c31e04359def6272db929 2006.0/RPMS/mozilla-firefox-hu-1.5.0.6-0.1.20060mdk.i586.rpm\n a704ed726e6db4ba59592563cd2c48b0 2006.0/RPMS/mozilla-firefox-it-1.5.0.6-0.1.20060mdk.i586.rpm\n 0ef6729b05e013a364e847e4a1b7b3e3 2006.0/RPMS/mozilla-firefox-ja-1.5.0.6-0.1.20060mdk.i586.rpm\n 570b19872de676414b399ff970024b78 2006.0/RPMS/mozilla-firefox-ko-1.5.0.6-0.1.20060mdk.i586.rpm\n dee38f0bbe3870d3bd8ad02ea968c57a 2006.0/RPMS/mozilla-firefox-nb-1.5.0.6-0.1.20060mdk.i586.rpm\n 92916e155ec38b5078234728593d72a2 2006.0/RPMS/mozilla-firefox-nl-1.5.0.6-0.1.20060mdk.i586.rpm\n c808f2f32fc9e514ffb097eeeb226a96 2006.0/RPMS/mozilla-firefox-pl-1.5.0.6-0.1.20060mdk.i586.rpm\n 6dda5771d062eae75f8f04b7dab8d6cc 2006.0/RPMS/mozilla-firefox-pt_BR-1.5.0.6-0.1.20060mdk.i586.rpm\n c4ac8441170504cc5ec05cf5c8e6e9f9 2006.0/RPMS/mozilla-firefox-ro-1.5.0.6-0.1.20060mdk.i586.rpm\n 2765008afd4c0ba1d702eda9627a7690 2006.0/RPMS/mozilla-firefox-ru-1.5.0.6-0.1.20060mdk.i586.rpm\n 15b600977b07651f1c3568f4d7f1f9ac 2006.0/RPMS/mozilla-firefox-sk-1.5.0.6-0.1.20060mdk.i586.rpm\n 6f1fae6befe608fc841fcc71e15852c0 2006.0/RPMS/mozilla-firefox-sl-1.5.0.6-0.1.20060mdk.i586.rpm\n 81f412da40ea14bcc23d420d7a5724f9 2006.0/RPMS/mozilla-firefox-sv-1.5.0.6-0.1.20060mdk.i586.rpm\n 76e0ece3c0b6f507340871a168a57e36 2006.0/RPMS/mozilla-firefox-tr-1.5.0.6-0.1.20060mdk.i586.rpm\n 6ded58e85ed113718cfb3484ae420bb9 2006.0/RPMS/mozilla-firefox-zh_CN-1.5.0.6-0.1.20060mdk.i586.rpm\n c76f6648e88de4a63991eac66c3fba04 2006.0/RPMS/mozilla-firefox-zh_TW-1.5.0.6-0.1.20060mdk.i586.rpm\n 1c7ab93275bcdcf30ed9ec2ddb4893df 2006.0/RPMS/yelp-2.10.0-6.1.20060mdk.i586.rpm\n 60279919aa5f17c2ecd9f64db87cb952 2006.0/SRPMS/devhelp-0.10-7.1.20060mdk.src.rpm\n c446c046409b6697a863868fe5c64222 2006.0/SRPMS/epiphany-1.8.5-4.1.20060mdk.src.rpm\n e726300336f737c8952f664bf1866d6f 2006.0/SRPMS/galeon-2.0.1-1.1.20060mdk.src.rpm\n e9e30596eceb0bc9a03f7880cd7d14ea 2006.0/SRPMS/gnome-doc-utils-0.4.4-2.1.20060mdk.src.rpm\n 4168c73cba97276fa4868b4ac2c7eb19 2006.0/SRPMS/mozilla-firefox-1.5.0.6-1.4.20060mdk.src.rpm\n 6a7df29f5af703d10d7ea1fee160ac00 2006.0/SRPMS/mozilla-firefox-br-1.5.0.6-0.1.20060mdk.src.rpm\n e56e14c28051ec4332cbde8dbee7bb6a 2006.0/SRPMS/mozilla-firefox-ca-1.5.0.6-0.1.20060mdk.src.rpm\n 1a144c86fd8db39e2801117296e15d2b 2006.0/SRPMS/mozilla-firefox-cs-1.5.0.6-0.1.20060mdk.src.rpm\n f4889d2ee6e07c0141b57ab9aaccae64 2006.0/SRPMS/mozilla-firefox-da-1.5.0.6-0.1.20060mdk.src.rpm\n dee0f7bc91c797e880fff19e1cb05a63 2006.0/SRPMS/mozilla-firefox-de-1.5.0.6-0.1.20060mdk.src.rpm\n 45724f6ceed66701392bd131feaf1f6d 2006.0/SRPMS/mozilla-firefox-el-1.5.0.6-0.1.20060mdk.src.rpm\n cc680cac7fea3f7f8a48a5daf86db088 2006.0/SRPMS/mozilla-firefox-es-1.5.0.6-0.1.20060mdk.src.rpm\n 69b04335c21313262af4253863109cc8 2006.0/SRPMS/mozilla-firefox-fi-1.5.0.6-0.1.20060mdk.src.rpm\n 2aab89244a535afcbc25271df5d6b33f 2006.0/SRPMS/mozilla-firefox-fr-1.5.0.6-0.1.20060mdk.src.rpm\n f1c7f71d5484c5047b1b38fc16888ae3 2006.0/SRPMS/mozilla-firefox-ga-1.5.0.6-0.1.20060mdk.src.rpm\n 3963e3c3a2c38c41d9d3bc5250b124a6 2006.0/SRPMS/mozilla-firefox-he-1.5.0.6-0.1.20060mdk.src.rpm\n bb54aed17a126a9e8568d49866db99ea 2006.0/SRPMS/mozilla-firefox-hu-1.5.0.6-0.1.20060mdk.src.rpm\n 2a1b11f2c8944bc1fc0d313d54a903cf 2006.0/SRPMS/mozilla-firefox-it-1.5.0.6-0.1.20060mdk.src.rpm\n 783c5b3c0fb9916e07f220110155476d 2006.0/SRPMS/mozilla-firefox-ja-1.5.0.6-0.1.20060mdk.src.rpm\n 895e315731fa0b453045cc39da4f5358 2006.0/SRPMS/mozilla-firefox-ko-1.5.0.6-0.1.20060mdk.src.rpm\n daa0a127d2a1a3641d4e97bfb95f1647 2006.0/SRPMS/mozilla-firefox-nb-1.5.0.6-0.1.20060mdk.src.rpm\n 0c778b0738b11dfd5d68be48fa6316ed 2006.0/SRPMS/mozilla-firefox-nl-1.5.0.6-0.1.20060mdk.src.rpm\n 7025d0118cf29e39117bd87c586e84a3 2006.0/SRPMS/mozilla-firefox-pl-1.5.0.6-0.1.20060mdk.src.rpm\n 5d8b8e869f588c0f5751e9ce7addba45 2006.0/SRPMS/mozilla-firefox-pt_BR-1.5.0.6-0.1.20060mdk.src.rpm\n c5148674a8c7dd1f88c5729293f899ba 2006.0/SRPMS/mozilla-firefox-ro-1.5.0.6-0.1.20060mdk.src.rpm\n 91d490c075473e2443e383201b961cb8 2006.0/SRPMS/mozilla-firefox-ru-1.5.0.6-0.1.20060mdk.src.rpm\n 622ae4619d151bb1634113e50b30fbac 2006.0/SRPMS/mozilla-firefox-sk-1.5.0.6-0.1.20060mdk.src.rpm\n e6d64c14929d299e2fb52e334ae6641a 2006.0/SRPMS/mozilla-firefox-sl-1.5.0.6-0.1.20060mdk.src.rpm\n 20f64c6dfd6aa1450cba5002d42f53d8 2006.0/SRPMS/mozilla-firefox-sv-1.5.0.6-0.1.20060mdk.src.rpm\n b93a6b548bb1cf0f8cc46dec133e81a3 2006.0/SRPMS/mozilla-firefox-tr-1.5.0.6-0.1.20060mdk.src.rpm\n f5603b65b3d10fa5083934e08d2d4560 2006.0/SRPMS/mozilla-firefox-zh_CN-1.5.0.6-0.1.20060mdk.src.rpm\n c0e978ea92b4a8f3aa75dad5ab7588b9 2006.0/SRPMS/mozilla-firefox-zh_TW-1.5.0.6-0.1.20060mdk.src.rpm\n 93cb0acaeddb095d13b37aeb0ab4dd49 2006.0/SRPMS/yelp-2.10.0-6.1.20060mdk.src.rpm\n\n Mandriva Linux 2006.0/X86_64:\n d52f4955f15f99137dd9a0b2f360c8b2 x86_64/2006.0/RPMS/devhelp-0.10-7.1.20060mdk.x86_64.rpm\n 369457b4a09c07ba18ee5bb18fb2ffa1 x86_64/2006.0/RPMS/epiphany-1.8.5-4.1.20060mdk.x86_64.rpm\n 76735684f3ff493770e374a90fd359c7 x86_64/2006.0/RPMS/epiphany-devel-1.8.5-4.1.20060mdk.x86_64.rpm\n 5da75ab6624f8c8f0c212ce2299d645f x86_64/2006.0/RPMS/galeon-2.0.1-1.1.20060mdk.x86_64.rpm\n 945059b9456c9ff2ccd40ff4a6d8ae70 x86_64/2006.0/RPMS/gnome-doc-utils-0.4.4-2.1.20060mdk.noarch.rpm\n 193f97760bb46e16051ba7b6b968f340 x86_64/2006.0/RPMS/lib64devhelp-1_0-0.10-7.1.20060mdk.x86_64.rpm\n 1b67733b0450cd6572c9879c0eb38640 x86_64/2006.0/RPMS/lib64devhelp-1_0-devel-0.10-7.1.20060mdk.x86_64.rpm\n 115fcbc6c99bf063cd1768d2b08e9d89 x86_64/2006.0/RPMS/lib64nspr4-1.5.0.6-1.4.20060mdk.x86_64.rpm\n 686404fa32e2625f23b19e11c548bbe5 x86_64/2006.0/RPMS/lib64nspr4-devel-1.5.0.6-1.4.20060mdk.x86_64.rpm\n f0886b330d3f5af566af6cf5572ca671 x86_64/2006.0/RPMS/lib64nspr4-static-devel-1.5.0.6-1.4.20060mdk.x86_64.rpm\n 10e9abdcb3f952c4db35c85fe58ad8ad x86_64/2006.0/RPMS/lib64nss3-1.5.0.6-1.4.20060mdk.x86_64.rpm\n 202bab2742f162d1cbd6d36720e6f7fb x86_64/2006.0/RPMS/lib64nss3-devel-1.5.0.6-1.4.20060mdk.x86_64.rpm\n e9aaff3090a4459b57367f4903b0458a x86_64/2006.0/RPMS/libnspr4-1.5.0.6-1.4.20060mdk.i586.rpm\n fa99cbc159722cc0ff9e5710f24ca599 x86_64/2006.0/RPMS/libnspr4-devel-1.5.0.6-1.4.20060mdk.i586.rpm\n d4d45b797ca2f2347c0409d9f956ff25 x86_64/2006.0/RPMS/libnspr4-static-devel-1.5.0.6-1.4.20060mdk.i586.rpm\n 8d33e72703090a911f7fd171ad9dd719 x86_64/2006.0/RPMS/libnss3-1.5.0.6-1.4.20060mdk.i586.rpm\n 23afd287c042c5492c210255554a6893 x86_64/2006.0/RPMS/libnss3-devel-1.5.0.6-1.4.20060mdk.i586.rpm\n 74811077c91dde3bc8c8bae45e5862a7 x86_64/2006.0/RPMS/mozilla-firefox-1.5.0.6-1.4.20060mdk.x86_64.rpm\n 75711988a67bf3f36fc08823561bb2b7 x86_64/2006.0/RPMS/mozilla-firefox-br-1.5.0.6-0.1.20060mdk.x86_64.rpm\n 5bd9ad43769390549ab3c4549c971db7 x86_64/2006.0/RPMS/mozilla-firefox-ca-1.5.0.6-0.1.20060mdk.x86_64.rpm\n dfdd808e2ec0866c15db5f1ea6a5b5bd x86_64/2006.0/RPMS/mozilla-firefox-cs-1.5.0.6-0.1.20060mdk.x86_64.rpm\n 1fad19f458ce0aa50e86710ed3b7fe04 x86_64/2006.0/RPMS/mozilla-firefox-da-1.5.0.6-0.1.20060mdk.x86_64.rpm\n 743e8d4f009ab2d2fc2e8c131244fb57 x86_64/2006.0/RPMS/mozilla-firefox-de-1.5.0.6-0.1.20060mdk.x86_64.rpm\n 476ee9a87f650a0ef3523a9619f9f611 x86_64/2006.0/RPMS/mozilla-firefox-devel-1.5.0.6-1.4.20060mdk.x86_64.rpm\n be48721cbc6e5634b50ce5b6cfe4a951 x86_64/2006.0/RPMS/mozilla-firefox-el-1.5.0.6-0.1.20060mdk.x86_64.rpm\n e56ce18466e20db3189e035329c606ce x86_64/2006.0/RPMS/mozilla-firefox-es-1.5.0.6-0.1.20060mdk.x86_64.rpm\n 489e5940c9ac9573842888ff07436e4c x86_64/2006.0/RPMS/mozilla-firefox-fi-1.5.0.6-0.1.20060mdk.x86_64.rpm\n 73d2eb2fc6ec99a1d3eeb94d9ddff36e x86_64/2006.0/RPMS/mozilla-firefox-fr-1.5.0.6-0.1.20060mdk.x86_64.rpm\n acbd3cd5f82b47a6c6cb03ebd6ca25ae x86_64/2006.0/RPMS/mozilla-firefox-ga-1.5.0.6-0.1.20060mdk.x86_64.rpm\n 362807f9da1130dd8da606b9ded06311 x86_64/2006.0/RPMS/mozilla-firefox-he-1.5.0.6-0.1.20060mdk.x86_64.rpm\n e48c991fa555d22d1f382baa83dfcae9 x86_64/2006.0/RPMS/mozilla-firefox-hu-1.5.0.6-0.1.20060mdk.x86_64.rpm\n 0d954f47de6d2cc58e36cd2c9ddae09c x86_64/2006.0/RPMS/mozilla-firefox-it-1.5.0.6-0.1.20060mdk.x86_64.rpm\n 8f615598d04985a0d60a3469ea3044ed x86_64/2006.0/RPMS/mozilla-firefox-ja-1.5.0.6-0.1.20060mdk.x86_64.rpm\n f4810510feb31e6195358c5ddd87252f x86_64/2006.0/RPMS/mozilla-firefox-ko-1.5.0.6-0.1.20060mdk.x86_64.rpm\n 537d53b7805ac84009f2ff99e3282b91 x86_64/2006.0/RPMS/mozilla-firefox-nb-1.5.0.6-0.1.20060mdk.x86_64.rpm\n afbc9ee04902213758bbf262b732de21 x86_64/2006.0/RPMS/mozilla-firefox-nl-1.5.0.6-0.1.20060mdk.x86_64.rpm\n dcef8c7676529394e5fbd4168f8e2cd6 x86_64/2006.0/RPMS/mozilla-firefox-pl-1.5.0.6-0.1.20060mdk.x86_64.rpm\n f4ee0e7ecba430fd3ce5e8ebeda9b5c1 x86_64/2006.0/RPMS/mozilla-firefox-pt_BR-1.5.0.6-0.1.20060mdk.x86_64.rpm\n 778261355184ca73cbf1aab1ce56644d x86_64/2006.0/RPMS/mozilla-firefox-ro-1.5.0.6-0.1.20060mdk.x86_64.rpm\n 10ca4e7f4cf10c380849ced0bf83e08b x86_64/2006.0/RPMS/mozilla-firefox-ru-1.5.0.6-0.1.20060mdk.x86_64.rpm\n 427cabc08ec66e1a45bc27e5625f49bb x86_64/2006.0/RPMS/mozilla-firefox-sk-1.5.0.6-0.1.20060mdk.x86_64.rpm\n de4e61d4fce7cd286bb4a3778cb8499f x86_64/2006.0/RPMS/mozilla-firefox-sl-1.5.0.6-0.1.20060mdk.x86_64.rpm\n 86e9af4c42b59e32d4e5ac0a8d1afe30 x86_64/2006.0/RPMS/mozilla-firefox-sv-1.5.0.6-0.1.20060mdk.x86_64.rpm\n 126b1e0826330986fbf485eabade949d x86_64/2006.0/RPMS/mozilla-firefox-tr-1.5.0.6-0.1.20060mdk.x86_64.rpm\n d2e6da2db277b7f5dabed3e95d4b818b x86_64/2006.0/RPMS/mozilla-firefox-zh_CN-1.5.0.6-0.1.20060mdk.x86_64.rpm\n a83edee07d2465cf55024ed1b7aa779f x86_64/2006.0/RPMS/mozilla-firefox-zh_TW-1.5.0.6-0.1.20060mdk.x86_64.rpm\n 9e33e2a0c3d4a92a0b420c417fcd3469 x86_64/2006.0/RPMS/yelp-2.10.0-6.1.20060mdk.x86_64.rpm\n 60279919aa5f17c2ecd9f64db87cb952 x86_64/2006.0/SRPMS/devhelp-0.10-7.1.20060mdk.src.rpm\n c446c046409b6697a863868fe5c64222 x86_64/2006.0/SRPMS/epiphany-1.8.5-4.1.20060mdk.src.rpm\n e726300336f737c8952f664bf1866d6f x86_64/2006.0/SRPMS/galeon-2.0.1-1.1.20060mdk.src.rpm\n e9e30596eceb0bc9a03f7880cd7d14ea x86_64/2006.0/SRPMS/gnome-doc-utils-0.4.4-2.1.20060mdk.src.rpm\n 4168c73cba97276fa4868b4ac2c7eb19 x86_64/2006.0/SRPMS/mozilla-firefox-1.5.0.6-1.4.20060mdk.src.rpm\n 6a7df29f5af703d10d7ea1fee160ac00 x86_64/2006.0/SRPMS/mozilla-firefox-br-1.5.0.6-0.1.20060mdk.src.rpm\n e56e14c28051ec4332cbde8dbee7bb6a x86_64/2006.0/SRPMS/mozilla-firefox-ca-1.5.0.6-0.1.20060mdk.src.rpm\n 1a144c86fd8db39e2801117296e15d2b x86_64/2006.0/SRPMS/mozilla-firefox-cs-1.5.0.6-0.1.20060mdk.src.rpm\n f4889d2ee6e07c0141b57ab9aaccae64 x86_64/2006.0/SRPMS/mozilla-firefox-da-1.5.0.6-0.1.20060mdk.src.rpm\n dee0f7bc91c797e880fff19e1cb05a63 x86_64/2006.0/SRPMS/mozilla-firefox-de-1.5.0.6-0.1.20060mdk.src.rpm\n 45724f6ceed66701392bd131feaf1f6d x86_64/2006.0/SRPMS/mozilla-firefox-el-1.5.0.6-0.1.20060mdk.src.rpm\n cc680cac7fea3f7f8a48a5daf86db088 x86_64/2006.0/SRPMS/mozilla-firefox-es-1.5.0.6-0.1.20060mdk.src.rpm\n 69b04335c21313262af4253863109cc8 x86_64/2006.0/SRPMS/mozilla-firefox-fi-1.5.0.6-0.1.20060mdk.src.rpm\n 2aab89244a535afcbc25271df5d6b33f x86_64/2006.0/SRPMS/mozilla-firefox-fr-1.5.0.6-0.1.20060mdk.src.rpm\n f1c7f71d5484c5047b1b38fc16888ae3 x86_64/2006.0/SRPMS/mozilla-firefox-ga-1.5.0.6-0.1.20060mdk.src.rpm\n 3963e3c3a2c38c41d9d3bc5250b124a6 x86_64/2006.0/SRPMS/mozilla-firefox-he-1.5.0.6-0.1.20060mdk.src.rpm\n bb54aed17a126a9e8568d49866db99ea x86_64/2006.0/SRPMS/mozilla-firefox-hu-1.5.0.6-0.1.20060mdk.src.rpm\n 2a1b11f2c8944bc1fc0d313d54a903cf x86_64/2006.0/SRPMS/mozilla-firefox-it-1.5.0.6-0.1.20060mdk.src.rpm\n 783c5b3c0fb9916e07f220110155476d x86_64/2006.0/SRPMS/mozilla-firefox-ja-1.5.0.6-0.1.20060mdk.src.rpm\n 895e315731fa0b453045cc39da4f5358 x86_64/2006.0/SRPMS/mozilla-firefox-ko-1.5.0.6-0.1.20060mdk.src.rpm\n daa0a127d2a1a3641d4e97bfb95f1647 x86_64/2006.0/SRPMS/mozilla-firefox-nb-1.5.0.6-0.1.20060mdk.src.rpm\n 0c778b0738b11dfd5d68be48fa6316ed x86_64/2006.0/SRPMS/mozilla-firefox-nl-1.5.0.6-0.1.20060mdk.src.rpm\n 7025d0118cf29e39117bd87c586e84a3 x86_64/2006.0/SRPMS/mozilla-firefox-pl-1.5.0.6-0.1.20060mdk.src.rpm\n 5d8b8e869f588c0f5751e9ce7addba45 x86_64/2006.0/SRPMS/mozilla-firefox-pt_BR-1.5.0.6-0.1.20060mdk.src.rpm\n c5148674a8c7dd1f88c5729293f899ba x86_64/2006.0/SRPMS/mozilla-firefox-ro-1.5.0.6-0.1.20060mdk.src.rpm\n 91d490c075473e2443e383201b961cb8 x86_64/2006.0/SRPMS/mozilla-firefox-ru-1.5.0.6-0.1.20060mdk.src.rpm\n 622ae4619d151bb1634113e50b30fbac x86_64/2006.0/SRPMS/mozilla-firefox-sk-1.5.0.6-0.1.20060mdk.src.rpm\n e6d64c14929d299e2fb52e334ae6641a x86_64/2006.0/SRPMS/mozilla-firefox-sl-1.5.0.6-0.1.20060mdk.src.rpm\n 20f64c6dfd6aa1450cba5002d42f53d8 x86_64/2006.0/SRPMS/mozilla-firefox-sv-1.5.0.6-0.1.20060mdk.src.rpm\n b93a6b548bb1cf0f8cc46dec133e81a3 x86_64/2006.0/SRPMS/mozilla-firefox-tr-1.5.0.6-0.1.20060mdk.src.rpm\n f5603b65b3d10fa5083934e08d2d4560 x86_64/2006.0/SRPMS/mozilla-firefox-zh_CN-1.5.0.6-0.1.20060mdk.src.rpm\n c0e978ea92b4a8f3aa75dad5ab7588b9 x86_64/2006.0/SRPMS/mozilla-firefox-zh_TW-1.5.0.6-0.1.20060mdk.src.rpm\n 93cb0acaeddb095d13b37aeb0ab4dd49 x86_64/2006.0/SRPMS/yelp-2.10.0-6.1.20060mdk.src.rpm\n _______________________________________________________________________\n\n To upgrade automatically use MandrivaUpdate or urpmi. The verification\n of md5 checksums and GPG signatures is performed automatically for you. \n\n All packages are signed by Mandriva for security. You can obtain the\n GPG public key of the Mandriva Security Team by executing:\n\n gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98\n\n You can view other update advisories for Mandriva Linux at:\n\n http://www.mandriva.com/security/advisories\n\n If you want to report vulnerabilities, please contact\n\n security_(at)_mandriva.com\n _______________________________________________________________________\n\n Type Bits/KeyID Date User ID\n pub 1024D/22458A98 2000-07-10 Mandriva Security Team\n \u003csecurity*mandriva.com\u003e\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.2.2 (GNU/Linux)\n\niD8DBQFE41l0mqjQ0CJFipgRAu1DAJ90MqoteYoIfAj0Gqim5fxrvOw7BACg0xq5\nL8QZWCg0xY3ZRacFzNTgusw=\n=gl6u\n-----END PGP SIGNATURE-----\n\n. ZDI-06-025: Mozilla Firefox Javascript navigator Object Vulnerability\nhttp://www.zerodayinitiative.com/advisories/ZDI-06-025.html\nJuly 26, 2006\n\n-- CVE ID:\nCVE-2006-3677\n\n-- Affected Vendor:\nMozilla\n\n-- Affected Products:\nFirefox 1.5.0 - 1.5.0.4\nSeaMonkey 1.0 - 1.0.2\n\n-- TippingPoint(TM) IPS Customer Protection:\nTippingPoint IPS customers have been protected against this\nvulnerability since July 26, 2006 by Digital Vaccine protection\nfilter ID 4326. More information is detailed in MFSA2006-45:\n\n http://www.mozilla.org/security/announce/2006/mfsa2006-45.html\n\n-- Disclosure Timeline:\n2006.06.16 - Vulnerability reported to vendor\n2006.07.25 - Vulnerability information provided to ZDI security partners\n2006.07.26 - Digital Vaccine released to TippingPoint customers\n2006.07.26 - Coordinated public release of advisory\n\n-- Credit:\nThis vulnerability was discovered by an anonymous researcher. \n\n-- About the Zero Day Initiative (ZDI):\nEstablished by TippingPoint, a division of 3Com, The Zero Day Initiative\n(ZDI) represents a best-of-breed model for rewarding security\nresearchers for responsibly disclosing discovered vulnerabilities. \n\nResearchers interested in getting paid for their security research\nthrough the ZDI can find more information and sign-up at:\n\n http://www.zerodayinitiative.com\n\nThe ZDI is unique in how the acquired vulnerability information is used. \n3Com does not re-sell the vulnerability details or any exploit code. \nInstead, upon notifying the affected product vendor, 3Com provides its\ncustomers with zero day protection through its intrusion prevention\ntechnology. Explicit details regarding the specifics of the\nvulnerability are not exposed to any parties until an official vendor\npatch is publicly available. Furthermore, with the altruistic aim of\nhelping to secure a broader user base, 3Com provides this vulnerability\ninformation confidentially to security vendors (including competitors)\nwho have a vulnerability protection or mitigation product", "sources": [ { "db": "NVD", "id": "CVE-2006-3677" }, { "db": "CERT/CC", "id": "VU#670060" }, { "db": "JVNDB", "id": "JVNDB-2006-000445" }, { "db": "ZDI", "id": "ZDI-06-025" }, { "db": "BID", "id": "19181" }, { "db": "BID", "id": "19192" }, { "db": "VULHUB", "id": "VHN-19785" }, { "db": "PACKETSTORM", "id": "48662" }, { "db": "PACKETSTORM", "id": "48661" }, { "db": "PACKETSTORM", "id": "49029" }, { "db": "PACKETSTORM", "id": "49032" }, { "db": "PACKETSTORM", "id": "48601" }, { "db": "PACKETSTORM", "id": "49350" }, { "db": "PACKETSTORM", "id": "48641" } ], "trust": 4.23 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://www.scap.org.cn/vuln/vhn-19785", "trust": 0.1, "type": "unknown" } ], "sources": [ { "db": "VULHUB", "id": "VHN-19785" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2006-3677", "trust": 4.4 }, { "db": "BID", "id": "19181", "trust": 3.6 }, { "db": "ZDI", "id": "ZDI-06-025", "trust": 3.3 }, { "db": "CERT/CC", "id": "VU#670060", "trust": 3.3 }, { "db": "BID", "id": "19192", "trust": 2.8 }, { "db": "USCERT", "id": "TA06-208A", "trust": 2.6 }, { "db": "SECUNIA", "id": "19873", "trust": 2.5 }, { "db": "SECUNIA", "id": "21216", "trust": 2.5 }, { "db": "VUPEN", "id": "ADV-2006-2998", "trust": 1.7 }, { "db": "VUPEN", "id": "ADV-2008-0083", "trust": 1.7 }, { "db": "VUPEN", "id": "ADV-2006-3748", "trust": 1.7 }, { "db": "SECUNIA", "id": "21336", "trust": 1.7 }, { "db": "SECUNIA", "id": "22066", "trust": 1.7 }, { "db": "SECUNIA", "id": "21529", "trust": 1.7 }, { "db": "SECUNIA", "id": "21361", "trust": 1.7 }, { "db": "SECUNIA", "id": "21243", "trust": 1.7 }, { "db": "SECUNIA", "id": "21532", "trust": 1.7 }, { "db": "SECUNIA", "id": "21246", "trust": 1.7 }, { "db": "SECUNIA", "id": "21229", "trust": 1.7 }, { "db": "SECUNIA", "id": "21262", "trust": 1.7 }, { "db": "SECUNIA", "id": "21343", "trust": 1.7 }, { "db": "SECUNIA", "id": "21269", "trust": 1.7 }, { "db": "SECUNIA", "id": "22210", "trust": 1.7 }, { "db": "SECUNIA", "id": "21270", "trust": 1.7 }, { "db": "SECTRACK", "id": "1016587", "trust": 1.7 }, { "db": "SECTRACK", "id": "1016586", "trust": 1.7 }, { "db": "SECUNIA", "id": "21631", "trust": 1.1 }, { "db": "USCERT", "id": "SA06-208A", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2006-000445", "trust": 0.8 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-055", "trust": 0.7 }, { "db": "CNNVD", "id": "CNNVD-200607-482", "trust": 0.7 }, { "db": "REDHAT", "id": "RHSA-2006:0609", "trust": 0.6 }, { "db": "REDHAT", "id": "RHSA-2006:0608", "trust": 0.6 }, { "db": "REDHAT", "id": "RHSA-2006:0611", "trust": 0.6 }, { "db": "REDHAT", "id": "RHSA-2006:0594", "trust": 0.6 }, { "db": "REDHAT", "id": "RHSA-2006:0610", "trust": 0.6 }, { "db": "CONFIRM", "id": "HTTP://WWW.MOZILLA.ORG/SECURITY/ANNOUNCE/2006/MFSA2006-45.HTML", "trust": 0.6 }, { "db": "UBUNTU", "id": "USN-354-1", "trust": 0.6 }, { "db": "UBUNTU", "id": "USN-327-1", "trust": 0.6 }, { "db": "SUSE", "id": "SUSE-SA:2006:048", "trust": 0.6 }, { "db": "BUGTRAQ", "id": "20060726 ZDI-06-025: MOZILLA FIREFOX JAVASCRIPT NAVIGATOR OBJECT VULNERABILITY", "trust": 0.6 }, { "db": "BUGTRAQ", "id": "20060727 RPSA-2006-0137-1 FIREFOX", "trust": 0.6 }, { "db": "XF", "id": "39998", "trust": 0.6 }, { "db": "XF", "id": "27981", "trust": 0.6 }, { "db": "CERT/CC", "id": "TA06-208A", "trust": 0.6 }, { "db": "GENTOO", "id": "GLSA-200608-02", "trust": 0.6 }, { "db": "GENTOO", "id": "GLSA-200608-03", "trust": 0.6 }, { "db": "HP", "id": "SSRT061181", "trust": 0.6 }, { "db": "MANDRIVA", "id": "MDKSA-2006:145", "trust": 0.6 }, { "db": "MANDRIVA", "id": "MDKSA-2006:143", "trust": 0.6 }, { "db": "SGI", "id": "20060703-01-P", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "48641", "trust": 0.2 }, { "db": "SEEBUG", "id": "SSVID-70818", "trust": 0.1 }, { "db": "SEEBUG", "id": "SSVID-63754", "trust": 0.1 }, { "db": "SEEBUG", "id": "SSVID-66996", "trust": 0.1 }, { "db": "EXPLOIT-DB", "id": "2082", "trust": 0.1 }, { "db": "EXPLOIT-DB", "id": "9946", "trust": 0.1 }, { "db": "EXPLOIT-DB", "id": "16300", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "82262", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "48773", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-19785", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "48662", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "48661", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "49029", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "49032", "trust": 0.1 }, { "db": "SECUNIA", "id": "21228", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "48601", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "49350", "trust": 0.1 } ], "sources": [ { "db": "CERT/CC", "id": "VU#670060" }, { "db": "ZDI", "id": "ZDI-06-025" }, { "db": "VULHUB", "id": "VHN-19785" }, { "db": "BID", "id": "19181" }, { "db": "BID", "id": "19192" }, { "db": "JVNDB", "id": "JVNDB-2006-000445" }, { "db": "PACKETSTORM", "id": "48662" }, { "db": "PACKETSTORM", "id": "48661" }, { "db": "PACKETSTORM", "id": "49029" }, { "db": "PACKETSTORM", "id": "49032" }, { "db": "PACKETSTORM", "id": "48601" }, { "db": "PACKETSTORM", "id": "49350" }, { "db": "PACKETSTORM", "id": "48641" }, { "db": "CNNVD", "id": "CNNVD-200607-482" }, { "db": "NVD", "id": "CVE-2006-3677" } ] }, "id": "VAR-200607-0664", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-19785" } ], "trust": 0.01 }, "last_update_date": "2024-11-29T21:40:09.208000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "mfsa2006-45", "trust": 1.5, "url": "http://www.mozilla.org/security/announce/2006/mfsa2006-45.html" }, { "title": "HPSBUX02153", "trust": 0.8, "url": "http://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00771742" }, { "title": "HPSBUX02153", "trust": 0.8, "url": "http://h50221.www5.hp.com/upassist/itrc_japan/assist2/secbltn/HP-UX/HPSBUX02153.html" }, { "title": "seamonkey (V2.x)", "trust": 0.8, "url": "http://www.miraclelinux.com/support/update/list.php?errata_id=984" }, { "title": "mfsa2006-45", "trust": 0.8, "url": "http://www.mozilla-japan.org/security/announce/2006/mfsa2006-45.html" }, { "title": "RHSA-2006:0608", "trust": 0.8, "url": "https://rhn.redhat.com/errata/RHSA-2006-0608.html" }, { "title": "RHSA-2006:0594", "trust": 0.8, "url": "https://rhn.redhat.com/errata/RHSA-2006-0594.html" }, { "title": "RHSA-2006:0610", "trust": 0.8, "url": "https://rhn.redhat.com/errata/RHSA-2006-0610.html" }, { "title": "RHSA-2006:0611", "trust": 0.8, "url": "https://rhn.redhat.com/errata/RHSA-2006-0611.html" }, { "title": "RHSA-2006:0609", "trust": 0.8, "url": "https://rhn.redhat.com/errata/RHSA-2006-0609.html" }, { "title": "RHSA-2006:0608", "trust": 0.8, "url": "http://www.jp.redhat.com/support/errata/RHSA/RHSA-2006-0608J.html" }, { "title": "RHSA-2006:0594", "trust": 0.8, "url": "http://www.jp.redhat.com/support/errata/RHSA/RHSA-2006-0594J.html" }, { "title": "RHSA-2006:0610", "trust": 0.8, "url": "http://www.jp.redhat.com/support/errata/RHSA/RHSA-2006-0610J.html" }, { "title": "RHSA-2006:0611", "trust": 0.8, "url": "http://www.jp.redhat.com/support/errata/RHSA/RHSA-2006-0611J.html" }, { "title": "RHSA-2006:0609", "trust": 0.8, "url": "http://www.jp.redhat.com/support/errata/RHSA/RHSA-2006-0609J.html" } ], "sources": [ { "db": "ZDI", "id": "ZDI-06-025" }, { "db": "JVNDB", "id": "JVNDB-2006-000445" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-16", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-19785" }, { "db": "NVD", "id": "CVE-2006-3677" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.3, "url": "http://www.securityfocus.com/bid/19181" }, { "trust": 3.2, "url": "http://www.mozilla.org/security/announce/2006/mfsa2006-45.html" }, { "trust": 2.6, "url": "http://www.zerodayinitiative.com/advisories/zdi-06-025.html" }, { "trust": 2.5, "url": "http://www.securityfocus.com/bid/19192" }, { "trust": 2.5, "url": "http://www.us-cert.gov/cas/techalerts/ta06-208a.html" }, { "trust": 2.5, "url": "http://www.kb.cert.org/vuls/id/670060" }, { "trust": 2.3, "url": "http://rhn.redhat.com/errata/rhsa-2006-0609.html" }, { "trust": 1.8, "url": "http://security.gentoo.org/glsa/glsa-200608-02.xml" }, { "trust": 1.7, "url": "https://issues.rpath.com/browse/rpl-536" }, { "trust": 1.7, "url": "http://www.gentoo.org/security/en/glsa/glsa-200608-03.xml" }, { "trust": 1.7, "url": "http://www.mandriva.com/security/advisories?name=mdksa-2006:143" }, { "trust": 1.7, "url": "http://www.mandriva.com/security/advisories?name=mdksa-2006:145" }, { "trust": 1.7, "url": "http://www.redhat.com/support/errata/rhsa-2006-0594.html" }, { "trust": 1.7, "url": "http://www.redhat.com/support/errata/rhsa-2006-0608.html" }, { "trust": 1.7, "url": "http://www.redhat.com/support/errata/rhsa-2006-0610.html" }, { "trust": 1.7, "url": "http://www.redhat.com/support/errata/rhsa-2006-0611.html" }, { "trust": 1.7, "url": "http://securitytracker.com/id?1016586" }, { "trust": 1.7, "url": "http://securitytracker.com/id?1016587" }, { "trust": 1.7, "url": "http://secunia.com/advisories/19873" }, { "trust": 1.7, "url": "http://secunia.com/advisories/21216" }, { "trust": 1.7, "url": "http://secunia.com/advisories/21229" }, { "trust": 1.7, "url": "http://secunia.com/advisories/21243" }, { "trust": 1.7, "url": "http://secunia.com/advisories/21246" }, { "trust": 1.7, "url": "http://secunia.com/advisories/21262" }, { "trust": 1.7, "url": "http://secunia.com/advisories/21269" }, { "trust": 1.7, "url": "http://secunia.com/advisories/21270" }, { "trust": 1.7, "url": "http://secunia.com/advisories/21336" }, { "trust": 1.7, "url": "http://secunia.com/advisories/21343" }, { "trust": 1.7, "url": "http://secunia.com/advisories/21361" }, { "trust": 1.7, "url": "http://secunia.com/advisories/21529" }, { "trust": 1.7, "url": "http://secunia.com/advisories/21532" }, { "trust": 1.7, "url": "http://secunia.com/advisories/22210" }, { "trust": 1.7, "url": "ftp://patches.sgi.com/support/free/security/advisories/20060703-01-u.asc" }, { "trust": 1.7, "url": "http://www.novell.com/linux/security/advisories/2006_48_seamonkey.html" }, { "trust": 1.7, "url": "http://www.ubuntu.com/usn/usn-354-1" }, { "trust": 1.2, "url": "http://www.mozilla.org/security/announce/2006/mfsa2006-44.html" }, { "trust": 1.1, "url": "http://www.securityfocus.com/archive/1/441332/100/0/threaded" }, { "trust": 1.1, "url": "http://www.securityfocus.com/archive/1/441333/100/0/threaded" }, { "trust": 1.1, "url": "http://www.securityfocus.com/archive/1/446658/100/200/threaded" }, { "trust": 1.1, "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a10745" }, { "trust": 1.1, "url": "http://secunia.com/advisories/21631" }, { "trust": 1.1, "url": "http://secunia.com/advisories/22066" }, { "trust": 1.1, "url": "https://usn.ubuntu.com/327-1/" }, { "trust": 1.1, "url": "http://www.vupen.com/english/advisories/2006/2998" }, { "trust": 1.1, "url": "http://www.vupen.com/english/advisories/2006/3748" }, { "trust": 1.1, "url": "http://www.vupen.com/english/advisories/2008/0083" }, { "trust": 1.1, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39998" }, { "trust": 1.1, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27981" }, { "trust": 1.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-3677" }, { "trust": 0.9, "url": "http://secunia.com/advisories/19873/" }, { "trust": 0.8, "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=342267 " }, { "trust": 0.8, "url": "http://secunia.com/advisories/21216/" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnta06-208a/" }, { "trust": 0.8, "url": "http://jvn.jp/tr/trta06-208a/" }, { "trust": 0.8, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2006-3677" }, { "trust": 0.8, "url": "http://www.us-cert.gov/cas/alerts/sa06-208a.html" }, { "trust": 0.6, "url": "http://rhn.redhat.com/errata/rhsa-2006-0608.html" }, { "trust": 0.6, "url": "http://rhn.redhat.com/errata/rhsa-2006-0594.html" }, { "trust": 0.6, "url": "http://rhn.redhat.com/errata/rhsa-2006-0610.html" }, { "trust": 0.6, "url": "http://rhn.redhat.com/errata/rhsa-2006-0611.html" }, { "trust": 0.6, "url": "/archive/1/441333" }, { "trust": 0.6, "url": "http://www.frsirt.com/english/advisories/2006/2998" }, { "trust": 0.6, "url": "http://xforce.iss.net/xforce/xfdb/27981" }, { "trust": 0.6, "url": "http://www.ubuntulinux.org/support/documentation/usn/usn-327-1" }, { "trust": 0.6, "url": "http://www.securityfocus.com/archive/1/archive/1/441333/100/0/threaded" }, { "trust": 0.6, "url": "http://www.securityfocus.com/archive/1/archive/1/441332/100/0/threaded" }, { "trust": 0.6, "url": "http://frontal2.mandriva.com/security/advisories?name=mdksa-2006:145" }, { "trust": 0.6, "url": "http://frontal2.mandriva.com/security/advisories?name=mdksa-2006:143" }, { "trust": 0.6, "url": "http://xforce.iss.net/xforce/xfdb/39998" }, { "trust": 0.6, "url": "http://www.securityfocus.com/archive/1/archive/1/446658/100/200/threaded" }, { "trust": 0.6, "url": "http://www.frsirt.com/english/advisories/2008/0083" }, { "trust": 0.6, "url": "http://www.frsirt.com/english/advisories/2006/3748" }, { "trust": 0.4, "url": "http://www.mozilla.org/security/announce/2006/mfsa2006-46.html" }, { "trust": 0.4, "url": "http://www.mozilla.org/security/announce/2006/mfsa2006-47.html" }, { "trust": 0.4, "url": "http://www.mozilla.org/security/announce/2006/mfsa2006-48.html" }, { "trust": 0.4, "url": "http://www.mozilla.org/security/announce/2006/mfsa2006-49.html" }, { "trust": 0.4, "url": "http://www.mozilla.org/security/announce/2006/mfsa2006-50.html" }, { "trust": 0.4, "url": "http://www.mozilla.org/security/announce/2006/mfsa2006-51.html" }, { "trust": 0.4, "url": "http://www.mozilla.org/security/announce/2006/mfsa2006-52.html" }, { "trust": 0.4, "url": "http://www.mozilla.org/security/announce/2006/mfsa2006-53.html" }, { "trust": 0.4, "url": "http://www.mozilla.org/security/announce/2006/mfsa2006-54.html" }, { "trust": 0.4, "url": "http://www.mozilla.org/security/announce/2006/mfsa2006-55.html" }, { "trust": 0.4, "url": "http://www.mozilla.org/security/announce/2006/mfsa2006-56.html" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2006-3677" }, { "trust": 0.3, "url": "http://r.your.hp.com/r/c/r?1.1.hx.dc.w2ce*.ctgd3g..t.e4wu.1_wg.31xxao" }, { "trust": 0.3, "url": "http://r.your.hp.com/r/c/r?1.1.hx.dc.w2ce*.ctgd3g..t.e4ww.1_wg.31u1aq" }, { "trust": 0.3, "url": "http://secunia.com/secunia_research/2006-53/advisory/" }, { "trust": 0.3, "url": "http://lists.grok.org.uk" }, { "trust": 0.3, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102971-1" }, { "trust": 0.3, "url": "https://www.it-isac.org/postings/cyber/uscertalerts.php" }, { "trust": 0.3, "url": "http://support.avaya.com/elmodocs2/security/asa-2007-155.htm" }, { "trust": 0.3, "url": "http://support.avaya.com/elmodocs2/security/asa-2007-311.htm" }, { "trust": 0.3, "url": "http://www2.itrc.hp.com/service/cki/docdisplay.do?admit=-1335382922+1188588104897+28353475\u0026docid=c00771742" }, { "trust": 0.3, "url": "http://www2.itrc.hp.com/service/cki/docdisplay.do?admit=-1335382922+1174502331230+28353475\u0026docid=c00774579" }, { "trust": 0.3, "url": "http://www2.itrc.hp.com/service/cki/docdisplay.do?admit=-1335382922+1188583914532+28353475\u0026docid=c00774579" }, { "trust": 0.3, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102763-1\u0026searchclause=" }, { "trust": 0.3, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102865-1\u0026searchclause=" }, { "trust": 0.3, "url": "http://browserfun.blogspot.com/2006/07/mobb-28-mozilla-navigator-object.html" }, { "trust": 0.3, "url": "/archive/1/441332" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2006-3803" }, { "trust": 0.3, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-3810" }, { "trust": 0.3, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-3113" }, { "trust": 0.3, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-3809" }, { "trust": 0.3, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-3802" }, { "trust": 0.3, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-3808" }, { "trust": 0.3, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-3806" }, { "trust": 0.3, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-3812" }, { "trust": 0.3, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-3801" }, { "trust": 0.3, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-3811" }, { "trust": 0.3, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-3805" }, { "trust": 0.3, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-3807" }, { "trust": 0.3, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-3803" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2006-3113" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2006-3807" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2006-3801" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2006-3806" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2006-3811" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2006-3805" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2006-3804" }, { "trust": 0.2, "url": "http://bugs.gentoo.org." }, { "trust": 0.2, "url": "http://creativecommons.org/licenses/by-sa/2.5" }, { "trust": 0.2, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-3804" }, { "trust": 0.2, "url": "http://security.gentoo.org/" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnss3_1.firefox1.5.dfsg+1.5.0.5-0ubuntu6.06_amd64.deb" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2006-3809" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnss3_1.firefox1.5.dfsg+1.5.0.5-0ubuntu6.06_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dbg_1.5.dfsg+1.5.0.5-0ubuntu6.06_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dbg_1.5.dfsg+1.5.0.5-0ubuntu6.06_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnspr-dev_1.firefox1.5.dfsg+1.5.0.5-0ubuntu6.06_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnspr4_1.firefox1.5.dfsg+1.5.0.5-0ubuntu6.06_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-gnome-support_1.5.dfsg+1.5.0.5-0ubuntu6.06_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnss-dev_1.firefox1.5.dfsg+1.5.0.5-0ubuntu6.06_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnspr4_1.firefox1.5.dfsg+1.5.0.5-0ubuntu6.06_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dbg_1.5.dfsg+1.5.0.5-0ubuntu6.06_sparc.deb" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2006-3812" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/f/firefox/firefox-dom-inspector_1.5.dfsg+1.5.0.5-0ubuntu6.06_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dbg_1.5.dfsg+1.5.0.5-0ubuntu6.06_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnspr-dev_1.firefox1.5.dfsg+1.5.0.5-0ubuntu6.06_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dev_1.5.dfsg+1.5.0.5-0ubuntu6.06_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.5-0ubuntu6.06.dsc" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnss-dev_1.firefox1.5.dfsg+1.5.0.5-0ubuntu6.06_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnss3_1.firefox1.5.dfsg+1.5.0.5-0ubuntu6.06_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dev_1.5.dfsg+1.5.0.5-0ubuntu6.06_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.5-0ubuntu6.06_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-gnome-support_1.5.dfsg+1.5.0.5-0ubuntu6.06_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/f/firefox/firefox-dom-inspector_1.5.dfsg+1.5.0.5-0ubuntu6.06_i386.deb" }, { "trust": 0.1, "url": "http://www.mozilla.org/projects/security/known-vulnerabilities.html#firefox" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.5-0ubuntu6.06_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/f/firefox/mozilla-firefox_1.5.dfsg+1.5.0.5-0ubuntu6.06_all.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dev_1.5.dfsg+1.5.0.5-0ubuntu6.06_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-gnome-support_1.5.dfsg+1.5.0.5-0ubuntu6.06_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/f/firefox/mozilla-firefox-dev_1.5.dfsg+1.5.0.5-0ubuntu6.06_all.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dev_1.5.dfsg+1.5.0.5-0ubuntu6.06_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-gnome-support_1.5.dfsg+1.5.0.5-0ubuntu6.06_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.5.orig.tar.gz" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2006-3810" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.5-0ubuntu6.06_i386.deb" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2006-3802" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnss-dev_1.firefox1.5.dfsg+1.5.0.5-0ubuntu6.06_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnspr-dev_1.firefox1.5.dfsg+1.5.0.5-0ubuntu6.06_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnspr4_1.firefox1.5.dfsg+1.5.0.5-0ubuntu6.06_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnspr4_1.firefox1.5.dfsg+1.5.0.5-0ubuntu6.06_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnss3_1.firefox1.5.dfsg+1.5.0.5-0ubuntu6.06_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/f/firefox/firefox-dom-inspector_1.5.dfsg+1.5.0.5-0ubuntu6.06_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnss-dev_1.firefox1.5.dfsg+1.5.0.5-0ubuntu6.06_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnspr-dev_1.firefox1.5.dfsg+1.5.0.5-0ubuntu6.06_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.5-0ubuntu6.06_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.5-0ubuntu6.06.diff.gz" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/f/firefox/firefox-dom-inspector_1.5.dfsg+1.5.0.5-0ubuntu6.06_amd64.deb" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2006-3808" }, { "trust": 0.1, "url": "http://www.mozilla.org/security/announce/\u003e" }, { "trust": 0.1, "url": "http://www.us-cert.gov/reading_room/securing_browser/browser_security.html#mozilla_firefox\u003e" }, { "trust": 0.1, "url": "http://www.kb.cert.org/vuls/byid?searchview\u0026query=firefox_1505\u003e" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-3806\u003e" }, { "trust": 0.1, "url": "http://www.us-cert.gov/cas/techalerts/ta06-208a.html\u003e" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-3803\u003e" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-3811\u003e" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-3113\u003e" }, { "trust": 0.1, "url": "http://www.us-cert.gov/cas/signup.html\u003e." }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-3801\u003e" }, { "trust": 0.1, "url": "http://www.mozilla.org/projects/security/known-vulnerabilities.html\u003e" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-3677\u003e" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-3805\u003e" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-3804\u003e" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-3807\u003e" }, { "trust": 0.1, "url": "http://www.us-cert.gov/legal.html\u003e" }, { "trust": 0.1, "url": "http://security.gentoo.org/glsa/glsa-200608-03.xml" }, { "trust": 0.1, "url": "http://secunia.com/product/9735/" }, { "trust": 0.1, "url": "http://secunia.com/secunia_security_advisories/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/21228/" }, { "trust": 0.1, "url": "http://secunia.com/hardcore_disassembler_and_reverse_engineer/" }, { "trust": 0.1, "url": "http://secunia.com/product/2637/" }, { "trust": 0.1, "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org" }, { "trust": 0.1, "url": "http://secunia.com/about_secunia_advisories/" }, { "trust": 0.1, "url": "http://secunia.com/product/4652/" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-2786" }, { "trust": 0.1, "url": "http://www.mozilla.org/security/announce/2006/mfsa2006-37.html" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-2787" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2006-2775" }, { "trust": 0.1, "url": "http://www.mozilla.org/security/announce/2006/mfsa2006-34.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2006-2780" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2006-2785" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-2783" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2006-2777" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-2785" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-2776" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-2784" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-2779" }, { "trust": 0.1, "url": "http://www.mozilla.org/security/announce/2006/mfsa2006-39.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2006-2788" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-2777" }, { "trust": 0.1, "url": "http://www.mozilla.org/security/announce/2006/mfsa2006-36.html" }, { "trust": 0.1, "url": "http://www.mozilla.org/security/announce/2006/mfsa2006-35.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2006-2786" }, { "trust": 0.1, "url": "http://www.mandriva.com/security/" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-2778" }, { "trust": 0.1, "url": "http://www.mozilla.org/security/announce/2006/mfsa2006-33.html" }, { "trust": 0.1, "url": "http://www.mozilla.org/security/announce/2006/mfsa2006-42.html" }, { "trust": 0.1, "url": "http://www.mozilla.org/security/announce/2006/mfsa2006-41.html" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-2782" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2006-2782" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-2788" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2006-2779" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2006-2784" }, { "trust": 0.1, "url": "http://www.mandriva.com/security/advisories" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-2775" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-2894" }, { "trust": 0.1, "url": "http://www.mozilla.org/security/announce/2006/mfsa2006-31.html" }, { "trust": 0.1, "url": "http://www.mozilla.org/security/announce/2006/mfsa2006-32.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2006-2783" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2006-2613" }, { "trust": 0.1, "url": "http://www.mozilla.org/security/announce/2006/mfsa2006-43.html" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-2780" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2006-2787" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2006-2776" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2006-2778" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2006-2894" }, { "trust": 0.1, "url": "http://www.mozilla.org/security/announce/2006/mfsa2006-38.html" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-2613" }, { "trust": 0.1, "url": "http://www.tippingpoint.com" }, { "trust": 0.1, "url": "http://www.zerodayinitiative.com" } ], "sources": [ { "db": "CERT/CC", "id": "VU#670060" }, { "db": "ZDI", "id": "ZDI-06-025" }, { "db": "VULHUB", "id": "VHN-19785" }, { "db": "BID", "id": "19181" }, { "db": "BID", "id": "19192" }, { "db": "JVNDB", "id": "JVNDB-2006-000445" }, { "db": "PACKETSTORM", "id": "48662" }, { "db": "PACKETSTORM", "id": "48661" }, { "db": "PACKETSTORM", "id": "49029" }, { "db": "PACKETSTORM", "id": "49032" }, { "db": "PACKETSTORM", "id": "48601" }, { "db": "PACKETSTORM", "id": "49350" }, { "db": "PACKETSTORM", "id": "48641" }, { "db": "CNNVD", "id": "CNNVD-200607-482" }, { "db": "NVD", "id": "CVE-2006-3677" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CERT/CC", "id": "VU#670060" }, { "db": "ZDI", "id": "ZDI-06-025" }, { "db": "VULHUB", "id": "VHN-19785" }, { "db": "BID", "id": "19181" }, { "db": "BID", "id": "19192" }, { "db": "JVNDB", "id": "JVNDB-2006-000445" }, { "db": "PACKETSTORM", "id": "48662" }, { "db": "PACKETSTORM", "id": "48661" }, { "db": "PACKETSTORM", "id": "49029" }, { "db": "PACKETSTORM", "id": "49032" }, { "db": "PACKETSTORM", "id": "48601" }, { "db": "PACKETSTORM", "id": "49350" }, { "db": "PACKETSTORM", "id": "48641" }, { "db": "CNNVD", "id": "CNNVD-200607-482" }, { "db": "NVD", "id": "CVE-2006-3677" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2006-07-27T00:00:00", "db": "CERT/CC", "id": "VU#670060" }, { "date": "2006-07-26T00:00:00", "db": "ZDI", "id": "ZDI-06-025" }, { "date": "2006-07-27T00:00:00", "db": "VULHUB", "id": "VHN-19785" }, { "date": "2006-07-26T00:00:00", "db": "BID", "id": "19181" }, { "date": "2006-07-26T00:00:00", "db": "BID", "id": "19192" }, { "date": "2007-04-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2006-000445" }, { "date": "2006-07-28T03:34:15", "db": "PACKETSTORM", "id": "48662" }, { "date": "2006-07-28T03:32:28", "db": "PACKETSTORM", "id": "48661" }, { "date": "2006-08-17T08:49:38", "db": "PACKETSTORM", "id": "49029" }, { "date": "2006-08-17T08:57:00", "db": "PACKETSTORM", "id": "49032" }, { "date": "2006-07-28T01:04:26", "db": "PACKETSTORM", "id": "48601" }, { "date": "2006-08-27T17:51:09", "db": "PACKETSTORM", "id": "49350" }, { "date": "2006-07-28T02:51:08", "db": "PACKETSTORM", "id": "48641" }, { "date": "2006-07-27T00:00:00", "db": "CNNVD", "id": "CNNVD-200607-482" }, { "date": "2006-07-27T19:04:00", "db": "NVD", "id": "CVE-2006-3677" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2007-02-09T00:00:00", "db": "CERT/CC", "id": "VU#670060" }, { "date": "2006-07-26T00:00:00", "db": "ZDI", "id": "ZDI-06-025" }, { "date": "2018-10-18T00:00:00", "db": "VULHUB", "id": "VHN-19785" }, { "date": "2007-09-05T15:42:00", "db": "BID", "id": "19181" }, { "date": "2007-09-05T02:11:00", "db": "BID", "id": "19192" }, { "date": "2007-04-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2006-000445" }, { "date": "2006-08-26T00:00:00", "db": "CNNVD", "id": "CNNVD-200607-482" }, { "date": "2024-11-21T00:14:09.847000", "db": "NVD", "id": "CVE-2006-3677" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "PACKETSTORM", "id": "48661" }, { "db": "CNNVD", "id": "CNNVD-200607-482" } ], "trust": 0.7 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Mozilla Firefox Javascript Navigator Object Remote Code Execution Vulnerability", "sources": [ { "db": "BID", "id": "19192" }, { "db": "CNNVD", "id": "CNNVD-200607-482" } ], "trust": 0.9 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "configuration error", "sources": [ { "db": "CNNVD", "id": "CNNVD-200607-482" } ], "trust": 0.6 } }
gsd-2006-3677
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2006-3677", "description": "Mozilla Firefox 1.5 before 1.5.0.5 and SeaMonkey before 1.0.3 allows remote attackers to execute arbitrary code by changing certain properties of the window navigator object (window.navigator) that are accessed when Java starts up, which causes a crash that leads to code execution.", "id": "GSD-2006-3677", "references": [ "https://www.suse.com/security/cve/CVE-2006-3677.html", "https://access.redhat.com/errata/RHSA-2006:0611", "https://access.redhat.com/errata/RHSA-2006:0610", "https://access.redhat.com/errata/RHSA-2006:0609", "https://access.redhat.com/errata/RHSA-2006:0608", "https://access.redhat.com/errata/RHSA-2006:0594", "https://linux.oracle.com/cve/CVE-2006-3677.html", "https://packetstormsecurity.com/files/cve/CVE-2006-3677" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2006-3677" ], "details": "Mozilla Firefox 1.5 before 1.5.0.5 and SeaMonkey before 1.0.3 allows remote attackers to execute arbitrary code by changing certain properties of the window navigator object (window.navigator) that are accessed when Java starts up, which causes a crash that leads to code execution.", "id": "GSD-2006-3677", "modified": "2023-12-13T01:19:57.542975Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-3677", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Mozilla Firefox 1.5 before 1.5.0.5 and SeaMonkey before 1.0.3 allows remote attackers to execute arbitrary code by changing certain properties of the window navigator object (window.navigator) that are accessed when Java starts up, which causes a crash that leads to code execution." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20060726 ZDI-06-025: Mozilla Firefox Javascript navigator Object Vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/441332/100/0/threaded" }, { "name": "21243", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/21243" }, { "name": "RHSA-2006:0608", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2006-0608.html" }, { "name": "GLSA-200608-02", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200608-02.xml" }, { "name": "MDKSA-2006:145", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:145" }, { "name": "ADV-2006-3748", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2006/3748" }, { "name": "iphone-mobilesafari-dos(39998)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39998" }, { "name": "19181", "refsource": "BID", "url": "http://www.securityfocus.com/bid/19181" }, { "name": "mozilla-javascript-navigator-code-excecution(27981)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27981" }, { "name": "TA06-208A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA06-208A.html" }, { "name": "ADV-2006-2998", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2006/2998" }, { "name": "20060727 rPSA-2006-0137-1 firefox", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/441333/100/0/threaded" }, { "name": "21529", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/21529" }, { "name": "http://www.zerodayinitiative.com/advisories/ZDI-06-025.html", "refsource": "MISC", "url": "http://www.zerodayinitiative.com/advisories/ZDI-06-025.html" }, { "name": "oval:org.mitre.oval:def:10745", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10745" }, { "name": "21216", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/21216" }, { "name": "GLSA-200608-03", "refsource": "GENTOO", "url": "http://www.gentoo.org/security/en/glsa/glsa-200608-03.xml" }, { "name": "RHSA-2006:0594", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2006-0594.html" }, { "name": "21336", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/21336" }, { "name": "RHSA-2006:0610", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2006-0610.html" }, { "name": "VU#670060", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/670060" }, { "name": "RHSA-2006:0609", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2006-0609.html" }, { "name": "22210", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/22210" }, { "name": "1016586", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1016586" }, { "name": "19873", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/19873" }, { "name": "21262", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/21262" }, { "name": "http://www.mozilla.org/security/announce/2006/mfsa2006-45.html", "refsource": "CONFIRM", "url": "http://www.mozilla.org/security/announce/2006/mfsa2006-45.html" }, { "name": "21532", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/21532" }, { "name": "21270", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/21270" }, { "name": "ADV-2008-0083", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/0083" }, { "name": "USN-327-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/327-1/" }, { "name": "21361", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/21361" }, { "name": "21631", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/21631" }, { "name": "SSRT061181", "refsource": "HP", "url": "http://www.securityfocus.com/archive/1/446658/100/200/threaded" }, { "name": "21246", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/21246" }, { "name": "SUSE-SA:2006:048", "refsource": "SUSE", "url": "http://www.novell.com/linux/security/advisories/2006_48_seamonkey.html" }, { "name": "21229", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/21229" }, { "name": "1016587", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1016587" }, { "name": "HPSBUX02153", "refsource": "HP", "url": "http://www.securityfocus.com/archive/1/446658/100/200/threaded" }, { "name": "RHSA-2006:0611", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2006-0611.html" }, { "name": "https://issues.rpath.com/browse/RPL-536", "refsource": "CONFIRM", "url": "https://issues.rpath.com/browse/RPL-536" }, { "name": "22066", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/22066" }, { "name": "21269", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/21269" }, { "name": "21343", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/21343" }, { "name": "MDKSA-2006:143", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:143" }, { "name": "19192", "refsource": "BID", "url": "http://www.securityfocus.com/bid/19192" }, { "name": "USN-354-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/usn-354-1" }, { "name": "20060703-01-P", "refsource": "SGI", "url": "ftp://patches.sgi.com/support/free/security/advisories/20060703-01-U.asc" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.5.0.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.5.0.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.5.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.5.0.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.0:*:dev:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-3677" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Mozilla Firefox 1.5 before 1.5.0.5 and SeaMonkey before 1.0.3 allows remote attackers to execute arbitrary code by changing certain properties of the window navigator object (window.navigator) that are accessed when Java starts up, which causes a crash that leads to code execution." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-16" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.zerodayinitiative.com/advisories/ZDI-06-025.html", "refsource": "MISC", "tags": [ "Vendor Advisory" ], "url": "http://www.zerodayinitiative.com/advisories/ZDI-06-025.html" }, { "name": "VU#670060", "refsource": "CERT-VN", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/670060" }, { "name": "http://www.mozilla.org/security/announce/2006/mfsa2006-45.html", "refsource": "CONFIRM", "tags": [ "Vendor Advisory" ], "url": "http://www.mozilla.org/security/announce/2006/mfsa2006-45.html" }, { "name": "https://issues.rpath.com/browse/RPL-536", "refsource": "CONFIRM", "tags": [], "url": "https://issues.rpath.com/browse/RPL-536" }, { "name": "19181", "refsource": "BID", "tags": [], "url": "http://www.securityfocus.com/bid/19181" }, { "name": "19192", "refsource": "BID", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/19192" }, { "name": "1016586", "refsource": "SECTRACK", "tags": [], "url": "http://securitytracker.com/id?1016586" }, { "name": "1016587", "refsource": "SECTRACK", "tags": [], "url": "http://securitytracker.com/id?1016587" }, { "name": "19873", "refsource": "SECUNIA", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/19873" }, { "name": "21216", "refsource": "SECUNIA", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/21216" }, { "name": "21229", "refsource": "SECUNIA", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/21229" }, { "name": "RHSA-2006:0608", "refsource": "REDHAT", "tags": [ "Vendor Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2006-0608.html" }, { "name": "TA06-208A", "refsource": "CERT", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA06-208A.html" }, { "name": "21246", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/21246" }, { "name": "RHSA-2006:0610", "refsource": "REDHAT", "tags": [ "Vendor Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2006-0610.html" }, { "name": "RHSA-2006:0611", "refsource": "REDHAT", "tags": [ "Vendor Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2006-0611.html" }, { "name": "21243", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/21243" }, { "name": "21269", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/21269" }, { "name": "21270", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/21270" }, { "name": "GLSA-200608-02", "refsource": "GENTOO", "tags": [], "url": "http://security.gentoo.org/glsa/glsa-200608-02.xml" }, { "name": "RHSA-2006:0609", "refsource": "REDHAT", "tags": [ "Vendor Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2006-0609.html" }, { "name": "21336", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/21336" }, { "name": "21361", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/21361" }, { "name": "GLSA-200608-03", "refsource": "GENTOO", "tags": [], "url": "http://www.gentoo.org/security/en/glsa/glsa-200608-03.xml" }, { "name": "20060703-01-P", "refsource": "SGI", "tags": [], "url": "ftp://patches.sgi.com/support/free/security/advisories/20060703-01-U.asc" }, { "name": "21262", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/21262" }, { "name": "21343", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/21343" }, { "name": "SUSE-SA:2006:048", "refsource": "SUSE", "tags": [], "url": "http://www.novell.com/linux/security/advisories/2006_48_seamonkey.html" }, { "name": "21529", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/21529" }, { "name": "21532", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/21532" }, { "name": "RHSA-2006:0594", "refsource": "REDHAT", "tags": [ "Vendor Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2006-0594.html" }, { "name": "21631", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/21631" }, { "name": "USN-354-1", "refsource": "UBUNTU", "tags": [], "url": "http://www.ubuntu.com/usn/usn-354-1" }, { "name": "22210", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/22210" }, { "name": "MDKSA-2006:143", "refsource": "MANDRIVA", "tags": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:143" }, { "name": "MDKSA-2006:145", "refsource": "MANDRIVA", "tags": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:145" }, { "name": "22066", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/22066" }, { "name": "ADV-2008-0083", "refsource": "VUPEN", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2008/0083" }, { "name": "ADV-2006-3748", "refsource": "VUPEN", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2006/3748" }, { "name": "ADV-2006-2998", "refsource": "VUPEN", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2006/2998" }, { "name": "iphone-mobilesafari-dos(39998)", "refsource": "XF", "tags": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39998" }, { "name": "mozilla-javascript-navigator-code-excecution(27981)", "refsource": "XF", "tags": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27981" }, { "name": "oval:org.mitre.oval:def:10745", "refsource": "OVAL", "tags": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10745" }, { "name": "USN-327-1", "refsource": "UBUNTU", "tags": [], "url": "https://usn.ubuntu.com/327-1/" }, { "name": "SSRT061181", "refsource": "HP", "tags": [], "url": "http://www.securityfocus.com/archive/1/446658/100/200/threaded" }, { "name": "20060727 rPSA-2006-0137-1 firefox", "refsource": "BUGTRAQ", "tags": [], "url": "http://www.securityfocus.com/archive/1/441333/100/0/threaded" }, { "name": "20060726 ZDI-06-025: Mozilla Firefox Javascript navigator Object Vulnerability", "refsource": "BUGTRAQ", "tags": [], "url": "http://www.securityfocus.com/archive/1/441332/100/0/threaded" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": true, "severity": "HIGH", "userInteractionRequired": false } }, "lastModifiedDate": "2018-10-18T16:48Z", "publishedDate": "2006-07-27T19:04Z" } } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.