CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
EPSS
Percentile
96.3%
CentOS Errata and Security Advisory CESA-2010:0557
SeaMonkey is an open source web browser, email and newsgroup client, IRC
chat client, and HTML editor.
An invalid free flaw was found in SeaMonkeyโs plugin handler. Malicious web
content could result in an invalid memory pointer being freed, causing SeaMonkey
to crash or, potentially, execute arbitrary code with the privileges of the user
running SeaMonkey. (CVE-2010-2755)
All SeaMonkey users should upgrade to these updated packages, which correct
this issue. After installing the update, SeaMonkey must be restarted for
the changes to take effect.
Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-announce/2010-August/079088.html
https://lists.centos.org/pipermail/centos-announce/2010-August/079089.html
https://lists.centos.org/pipermail/centos-announce/2010-July/078995.html
https://lists.centos.org/pipermail/centos-announce/2010-July/078996.html
Affected packages:
seamonkey
seamonkey-chat
seamonkey-devel
seamonkey-dom-inspector
seamonkey-js-debugger
seamonkey-mail
seamonkey-nspr
seamonkey-nspr-devel
seamonkey-nss
seamonkey-nss-devel
Upstream details at:
https://access.redhat.com/errata/RHSA-2010:0557